CCA-Secure Public Key Encryption without Group-Dependent Hash Functions

被引:0
|
作者
Cui, Yang [1 ,2 ]
Hanaoka, Goichiro [1 ]
Imai, Hideki [1 ,2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, AIST, RCIS, Tokyo 1010021, Japan
[2] Chuo Univ, Tokyo 1128551, Japan
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2009年 / E92D卷 / 05期
基金
日本学术振兴会;
关键词
CCA-secure public-key encryption; group-dependent hash;
D O I
10.1587/transinf.E92.D.967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
So far, in almost all of the practical public key encryption schemes, hash functions which are dependent on underlying cyclic groups are necessary, e.g., H : {0, 1}* -> Z(p) where p is the order of the underlying cyclic group, and it could be required to construct a dedicated hash function for each public key. The motivation of this note is derived from the following two facts: 1). there is an important technical gap between hashing to a specific prime-order group and hashing to a certain length bit sequence, and this could cause a security hole: 2). surprisingly, to our best knowledge, there is no explicit induction that one could use the simple construction, instead of tailor-made hash functions. In this note, we investigate this issue and provide the first rigorous discussion that in many existing schemes, it is possible to replace such hash functions with a target collision resistant hash function H : {0, 1}* -> {0, 1}(k), where k is the security parameter. We think that it is very useful and could drastically save the cost for the hash function implementation in many practical cryptographic schemes.
引用
收藏
页码:967 / 970
页数:4
相关论文
共 50 条
  • [41] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [42] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Nandi, Mridul
    Pandit, Tapas
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (01) : 77 - 102
  • [43] A general construction of IND-CCA2 secure public key encryption
    Kiltz, E
    Malone-Lee, J
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 152 - 166
  • [44] CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications
    Zhang, Minqing
    Wang, Xu An
    Li, Weihua
    Yang, Xiaoyuan
    JOURNAL OF COMPUTERS, 2013, 8 (08) : 1987 - 1994
  • [45] A Multi-use CCA-secure Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 39 - +
  • [46] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Mridul Nandi
    Tapas Pandit
    Applicable Algebra in Engineering, Communication and Computing, 2018, 29 : 77 - 102
  • [47] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Lee, Youngkyung
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2433 - 2452
  • [48] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [49] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Youngkyung Lee
    Dong Hoon Lee
    Jong Hwan Park
    Designs, Codes and Cryptography, 2020, 88 : 2433 - 2452
  • [50] Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
    Tseng, Yi-Fan
    Fan, Chun-I
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (06) : 1517 - 1541