On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes

被引:0
|
作者
Baek, Joonsang [1 ]
Chu, Cheng-Kang [1 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore 138632, Singapore
来源
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new constructions of (conventional) public key and stateful public key encryption schemes which produce ciphertexts of compact size while providing both efficiency and strong security. Our public key encryption scheme incurs only one group element ciphertext expansion (defined as the size of the ciphertext minus the size of the plaintext message) but compared with the previous scheme in the literature, its encryption algorithm is more efficient. Our stateful encryption scheme resolves the problem of ciphertext expansion of the existing schemes in the literature and hence can be served as a favorable alternative. Both of our schemes do not depend on the external length-preserving cipher constructed from the expensive strong pseudo random permutation. We provide security analysis of our schemes against chosen ciphertext attack under the well-known computational assumptions, in the random oracle model. We envision that our schemes can serve as efficient public key primitives suitable for implementing on resource-constrained devices.
引用
收藏
页码:302 / 318
页数:17
相关论文
共 50 条
  • [31] Key recovery on several matrix public-key encryption schemes
    Wang, Houzhen
    Zhang, Huanguo
    Tang, Shaohua
    IET INFORMATION SECURITY, 2016, 10 (03) : 152 - 155
  • [32] Stateful Public Key Encryption: How to Remove Gap Assumptions and Maintaining Tight Reductions
    Yang, Peng
    Zhang, Rui
    Matsuura, Kanta
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 346 - +
  • [33] A new aspect for security notions: Secure randomness in public-key encryption schemes
    Koshiba, T
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 87 - 103
  • [34] Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions
    Galindo, David
    Libert, Benoit
    Fischlin, Marc
    Fuchsbauer, Georg
    Lehmann, Anja
    Manulis, Mark
    Schroeder, Dominique
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 333 - +
  • [35] SQNTRU: New Public Key Encryption
    Yassein, Hassan Rashed
    Ali, Huda Abdulateef
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2023, 18 (03): : 381 - 385
  • [36] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [37] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [38] More Constructions of Re-Splittable Threshold Public Key Encryption
    Ohata, Satsuya
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) : 1473 - 1483
  • [39] Strong Knowledge Extractors for Public-Key Encryption Schemes
    Barbosa, Manuel
    Farshim, Pooya
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 164 - +
  • [40] Compact public key encryption without full random oracles
    Yoneyama, Kazuki
    Hanaoka, Goichiro
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 286 - 299