CCA-Secure Public Key Encryption without Group-Dependent Hash Functions

被引:0
|
作者
Cui, Yang [1 ,2 ]
Hanaoka, Goichiro [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, AIST, RCIS, Tokyo 1010021, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2009年 / E92D卷 / 05期
基金
日本学术振兴会;
关键词
CCA-secure public-key encryption; group-dependent hash;
D O I
10.1587/transinf.E92.D.967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
So far, in almost all of the practical public key encryption schemes, hash functions which are dependent on underlying cyclic groups are necessary, e.g., H : {0, 1}* -> Z(p) where p is the order of the underlying cyclic group, and it could be required to construct a dedicated hash function for each public key. The motivation of this note is derived from the following two facts: 1). there is an important technical gap between hashing to a specific prime-order group and hashing to a certain length bit sequence, and this could cause a security hole: 2). surprisingly, to our best knowledge, there is no explicit induction that one could use the simple construction, instead of tailor-made hash functions. In this note, we investigate this issue and provide the first rigorous discussion that in many existing schemes, it is possible to replace such hash functions with a target collision resistant hash function H : {0, 1}* -> {0, 1}(k), where k is the security parameter. We think that it is very useful and could drastically save the cost for the hash function implementation in many practical cryptographic schemes.
引用
收藏
页码:967 / 970
页数:4
相关论文
共 50 条
  • [31] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [32] Simple and Efficient KDM-CCA Secure Public Key Encryption
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Tanaka, Keisuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 97 - 127
  • [33] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [34] CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs
    Zhao, Yi
    Liang, Kaitai
    Yang, Bo
    Chen, Liqun
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [35] More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles
    Wang, Hongbing
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 173 - 181
  • [37] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    Weng Jian
    Chen MinRong
    Yang YanJiang
    Deng, Robert
    Chen Kefei
    Bao Feng
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 593 - 606
  • [38] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
  • [39] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    Jian Weng
    MinRong Chen
    YanJiang Yang
    Robert Deng
    KeFei Chen
    Feng Bao
    Science China Information Sciences, 2010, 53 : 593 - 606
  • [40] CCA-SECURE KEY ENCAPSULATION MECHANISM BASED ON FACTORING ASSUMPTION
    Marton, Gyoengyver
    TATRACRYPT '12, 2012, 53 : 137 - 146