Public key encryption without random oracle made truly practical

被引:1
|
作者
Wei, Puwen [1 ,2 ]
Wang, Xiaoyun [3 ]
Zheng, Yuliang [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[3] Tsinghua Univ, Ctr Adv Study, Beijing 100084, Peoples R China
[4] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
基金
中国国家自然科学基金;
关键词
CHOSEN CIPHERTEXT ATTACK; HYBRID ENCRYPTION; HASH FUNCTIONS; SECURE; PARADIGM; SCHEME;
D O I
10.1016/j.compeleceng.2012.02.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we report our success in identifying an efficient public key encryption scheme whose formal security proof does not require a random oracle. Specifically, we focus our attention on a universal hash based public key encryption scheme proposed by Zheng and Seberry at Crypto'92. Although Zheng and Seberry's encryption scheme is very simple and efficient, its reductionist security proof has not been provided. We show how to tweak the Zheng-Seberry scheme so that the resultant scheme not only preserves the efficiency of the original scheme but also admits provable security against adaptive chosen ciphertext attack without random oracle. For the security proof, our first attempt is based on a strong assumption called the oracle Diffie-Hellman(+) assumption. This is followed by a more challenging proof that employs a weaker assumption called the adaptive decisional Diffie-Hellman assumption, which is in alignment with adaptively secure assumptions advocated by Pandey, Pass and Vaikuntanathan. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:975 / 985
页数:11
相关论文
共 50 条
  • [21] HIBE with short public parameters without random oracle
    Chatterjee, Sanjit
    Sarkar, Palash
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 145 - +
  • [22] Anonymous Conditional Proxy Re-encryption without Random Oracle
    Fang, Liming
    Susilo, Willy
    Wang, Jiandong
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 47 - +
  • [23] A Practical Quantum Public-key Encryption Model
    Wang, Yuqi
    She, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 367 - 372
  • [24] An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles
    Lu, Yang
    Li, Jiguo
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 22 - 25
  • [25] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie ZHANG
    Chunxiang XU
    Wenzheng ZHANG
    Wanpeng LI
    Frontiers of Computer Science, 2013, 7 (06) : 955 - 968
  • [26] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Zhang, Xiujie
    Xu, Chunxiang
    Zhang, Wenzheng
    Li, Wanpeng
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (06) : 955 - 968
  • [27] Certificateless public key encryption in the Selective-ID security model (Without random oracles)
    Park, Jong Hwan
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2007, 2007, 4575 : 60 - +
  • [28] Threshold public key encryption scheme resilient against continual leakage without random oracles
    Xiujie Zhang
    Chunxiang Xu
    Wenzheng Zhang
    Wanpeng Li
    Frontiers of Computer Science, 2013, 7 : 955 - 968
  • [29] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478
  • [30] A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
    Gong, Linming
    Li, Shundong
    Mao, Qing
    Wang, Daoshun
    Dou, Jiawei
    THEORETICAL COMPUTER SCIENCE, 2016, 609 : 253 - 261