A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

被引:0
|
作者
Yehuda Lindell
机构
[1] Department of Computer Science,
[2] Bar-Ilan University,undefined
[3] Ramat Gan 52900,undefined
来源
Journal of Cryptology | 2006年 / 19卷
关键词
Public-key encryption; Adaptive chosen-ciphertext attacks; Simulation-sound non-interactive zero-knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor--Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.
引用
收藏
页码:359 / 377
页数:18
相关论文
共 50 条
  • [21] Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 62 - 92
  • [22] Novel construction of forward-secure public-key encryption in the standard model
    Lu, Y., 1600, Editorial Board of Journal on Communications (35):
  • [23] Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
    Fujioka, Atsushi
    Okamoto, Yoshiaki
    Saito, Taiichi
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 319 - 336
  • [24] Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
    Fujioka, Atsushi
    Okamoto, Yoshiaki
    Saito, Taiichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 76 - 91
  • [25] Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Joseph K.
    Parampalli, Udaya
    Yuen, Tsz Hon
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 901 - 906
  • [26] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Pereira, Mayana
    Dowsley, Rafael
    Nascimento, Anderson C. A.
    Hanaoka, Goichiro
    COMPUTER JOURNAL, 2015, 58 (10): : 2738 - 2746
  • [27] Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
    Dowsley, Rafael (rafael.dowsley@kit.edu), 1600, Oxford University Press (58):
  • [28] Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
    Hu, Chengyu
    Yu, Zuoxia
    Yang, Rupeng
    Xu, Qiuliang
    Zhou, Yongbin
    Yuan, Qixia
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 216 - 229
  • [29] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [30] Multi-instance Secure Public-Key Encryption
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 336 - 367