A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

被引:0
|
作者
Yehuda Lindell
机构
[1] Department of Computer Science,
[2] Bar-Ilan University,undefined
[3] Ramat Gan 52900,undefined
来源
Journal of Cryptology | 2006年 / 19卷
关键词
Public-key encryption; Adaptive chosen-ciphertext attacks; Simulation-sound non-interactive zero-knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor--Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.
引用
收藏
页码:359 / 377
页数:18
相关论文
共 50 条
  • [2] A simpler construction of CCA2-secure public-key encryption under general assumptions
    Lindell, Y
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 241 - 254
  • [3] Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing
    Zhou, Yanwei
    Yang, Bo
    INFORMATION PROCESSING LETTERS, 2018, 130 : 16 - 24
  • [4] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [5] A general construction of IND-CCA2 secure public key encryption
    Kiltz, E
    Malone-Lee, J
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 152 - 166
  • [6] Bounded CCA2-secure encryption
    Cramer, Ronald
    Hanaoka, Goichiro
    Hofheinz, Dennis
    Imai, Hideki
    Kiltz, Eike
    Pass, Rafael
    Shelat, Abhi
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 502 - +
  • [7] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
  • [8] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36
  • [9] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
  • [10] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519