A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors)

被引:1
|
作者
Bessonov, Mariya [1 ]
Grigoriev, Dima [2 ]
Shpilrain, Vladimir [3 ]
机构
[1] New York City Coll Technol, Brooklyn, NY USA
[2] Univ Lille, Lille, France
[3] CUNY City Coll, New York, NY 10031 USA
来源
关键词
D O I
10.1007/978-3-319-96418-8_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We offer a public-key encryption protocol where decryption of a single bit by a legitimate party is correct with probability p that is greater than 1/2 but less than 1. At the same time, a computationally unbounded (passive) adversary correctly recovers the transmitted bit with probability exactly 1/2.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 50 条
  • [41] Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
    Sakai, Yusuke
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 165 - 172
  • [42] Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
    Fujioka, Atsushi
    Okamoto, Yoshiaki
    Saito, Taiichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 76 - 91
  • [43] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [44] Provably secure threshold public-key encryption with adaptive security and short ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Farras, Oriol
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2012, 210 : 67 - 80
  • [45] New forward-secure public-key encryption without random oracles
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) : 2603 - 2613
  • [46] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [47] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [48] TFHE Public-Key Encryption Revisited
    Joye, Marc
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291
  • [49] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [50] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600