CCA-Secure Public Key Encryption without Group-Dependent Hash Functions

被引:0
|
作者
Cui, Yang [1 ,2 ]
Hanaoka, Goichiro [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, AIST, RCIS, Tokyo 1010021, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2009年 / E92D卷 / 05期
基金
日本学术振兴会;
关键词
CCA-secure public-key encryption; group-dependent hash;
D O I
10.1587/transinf.E92.D.967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
So far, in almost all of the practical public key encryption schemes, hash functions which are dependent on underlying cyclic groups are necessary, e.g., H : {0, 1}* -> Z(p) where p is the order of the underlying cyclic group, and it could be required to construct a dedicated hash function for each public key. The motivation of this note is derived from the following two facts: 1). there is an important technical gap between hashing to a specific prime-order group and hashing to a certain length bit sequence, and this could cause a security hole: 2). surprisingly, to our best knowledge, there is no explicit induction that one could use the simple construction, instead of tailor-made hash functions. In this note, we investigate this issue and provide the first rigorous discussion that in many existing schemes, it is possible to replace such hash functions with a target collision resistant hash function H : {0, 1}* -> {0, 1}(k), where k is the security parameter. We think that it is very useful and could drastically save the cost for the hash function implementation in many practical cryptographic schemes.
引用
收藏
页码:967 / 970
页数:4
相关论文
共 50 条
  • [21] CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
    Sun, Yinxia
    Zhang, Futai
    Fu, Anmin
    Xia, Zhe
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 175 - 191
  • [22] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378
  • [23] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
  • [24] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [25] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [26] Tightly CCA-secure inner product functional encryption scheme
    Liu, Xiangyu
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    THEORETICAL COMPUTER SCIENCE, 2022, 898 : 1 - 19
  • [27] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [28] Practical CCA-Secure Functional Encryptions for Deterministic Functions
    Wang, Huige
    Chen, Kefei
    Pan, Tianyu
    Zhao, Yunlei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [29] Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption
    Chen, Kaiming
    Miyaji, Atsuko
    Chen, Jiageng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 168 - 185
  • [30] Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Yamakawa, Takashi
    Yamada, Shota
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Kunihiro, Noboru
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 100 - 109