Public key encryption without random oracle made truly practical

被引:1
|
作者
Wei, Puwen [1 ,2 ]
Wang, Xiaoyun [3 ]
Zheng, Yuliang [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[3] Tsinghua Univ, Ctr Adv Study, Beijing 100084, Peoples R China
[4] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
基金
中国国家自然科学基金;
关键词
CHOSEN CIPHERTEXT ATTACK; HYBRID ENCRYPTION; HASH FUNCTIONS; SECURE; PARADIGM; SCHEME;
D O I
10.1016/j.compeleceng.2012.02.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we report our success in identifying an efficient public key encryption scheme whose formal security proof does not require a random oracle. Specifically, we focus our attention on a universal hash based public key encryption scheme proposed by Zheng and Seberry at Crypto'92. Although Zheng and Seberry's encryption scheme is very simple and efficient, its reductionist security proof has not been provided. We show how to tweak the Zheng-Seberry scheme so that the resultant scheme not only preserves the efficiency of the original scheme but also admits provable security against adaptive chosen ciphertext attack without random oracle. For the security proof, our first attempt is based on a strong assumption called the oracle Diffie-Hellman(+) assumption. This is followed by a more challenging proof that employs a weaker assumption called the adaptive decisional Diffie-Hellman assumption, which is in alignment with adaptively secure assumptions advocated by Pandey, Pass and Vaikuntanathan. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:975 / 985
页数:11
相关论文
共 50 条
  • [1] Public Key Encryption without Random Oracle Made Truly Practical
    Wei, Puwen
    Wang, Xiaoyun
    Zheng, Yuliang
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 107 - +
  • [2] Public key searchable encryption without random oracle
    Zhang, X. (zxf071714229@hotmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [3] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172
  • [4] Certificateless Public Key Encryption Made Practical
    Viet Cuong Trinh
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 54 - 59
  • [5] Adaptively anonymous public-key broadcast encryption scheme without random oracle
    Wang, Hao
    Wu, Lei
    Journal of Networks, 2014, 9 (06) : 1656 - 1663
  • [6] Multi-Key Searchable Encryption Without Random Oracle
    Yang, Jun
    Liu, Zheli
    Li, Jin
    Jia, Chunfu
    Cui, Baojiang
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 79 - 84
  • [7] A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 248 - +
  • [8] Quantum Random Oracle Model for Quantum Public-Key Encryption
    Shang, Tao
    Chen, Ranyiliu
    Lei, Qi
    IEEE ACCESS, 2019, 7 (130024-130031) : 130024 - 130031
  • [9] Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    INFORMATION SCIENCES, 2013, 238 : 221 - 241
  • [10] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105