On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes

被引:0
|
作者
Baek, Joonsang [1 ]
Chu, Cheng-Kang [1 ]
Zhou, Jianying [1 ]
机构
[1] Inst Infocomm Res, Singapore 138632, Singapore
来源
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present new constructions of (conventional) public key and stateful public key encryption schemes which produce ciphertexts of compact size while providing both efficiency and strong security. Our public key encryption scheme incurs only one group element ciphertext expansion (defined as the size of the ciphertext minus the size of the plaintext message) but compared with the previous scheme in the literature, its encryption algorithm is more efficient. Our stateful encryption scheme resolves the problem of ciphertext expansion of the existing schemes in the literature and hence can be served as a favorable alternative. Both of our schemes do not depend on the external length-preserving cipher constructed from the expensive strong pseudo random permutation. We provide security analysis of our schemes against chosen ciphertext attack under the well-known computational assumptions, in the random oracle model. We envision that our schemes can serve as efficient public key primitives suitable for implementing on resource-constrained devices.
引用
收藏
页码:302 / 318
页数:17
相关论文
共 50 条
  • [41] Certificateless public key encryption: A new generic construction and two pairing-free schemes
    Yang, Guomin
    Tan, Chik How
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (8-10) : 662 - 674
  • [42] Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
    Manh Ha Nguyen
    Yasunaga, Kenji
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1100 - 1111
  • [43] Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions
    Anada, Hiroaki
    Kanaoka, Akira
    Matsuzaki, Natsume
    Watanabe, Yohei
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 341 - 359
  • [44] Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security
    Abou Haidar, Calvin
    Libert, Benoit
    Passelegue, Alain
    PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022, 2022, : 11 - 22
  • [45] Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
    Shihui Zheng
    Lize Gu
    Da Xiao
    International Journal of Theoretical Physics, 2014, 53 : 116 - 124
  • [46] Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
    Zheng, Shihui
    Gu, Lize
    Xiao, Da
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (01) : 116 - 124
  • [47] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [48] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [49] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [50] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749