A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

被引:0
|
作者
Yehuda Lindell
机构
[1] Department of Computer Science,
[2] Bar-Ilan University,undefined
[3] Ramat Gan 52900,undefined
来源
Journal of Cryptology | 2006年 / 19卷
关键词
Public-key encryption; Adaptive chosen-ciphertext attacks; Simulation-sound non-interactive zero-knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor--Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.
引用
收藏
页码:359 / 377
页数:18
相关论文
共 50 条
  • [31] A Forward-Secure Public-Key Encryption Scheme
    Ran Canetti
    Shai Halevi
    Jonathan Katz
    Journal of Cryptology, 2007, 20 : 265 - 294
  • [32] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [33] Efficient chosen ciphertext secure public-key encryption under factoring assumption
    Qin, Baodong
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 351 - 360
  • [34] Continuous Leakage-Amplified Public-Key Encryption With CCA Security
    Zhang, Wenzheng
    Qiao, Zirui
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
  • [35] Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption
    Faonio, Antonio
    Russo, Luigi
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 172 - 196
  • [36] A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles
    Wang, Shengbao
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    Wang, Hongbing
    INFORMATICA, 2015, 26 (03) : 543 - 556
  • [37] Secure public-key encryption scheme without random oracles
    Tan, Chik How
    INFORMATION SCIENCES, 2008, 178 (17) : 3435 - 3442
  • [38] Provably secure public-key encryption schemes: EPOC and PSEC
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 740 - 749
  • [39] Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption
    Chen, Kaiming
    Miyaji, Atsuko
    Chen, Jiageng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 168 - 185
  • [40] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370