A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

被引:0
|
作者
Yehuda Lindell
机构
[1] Department of Computer Science,
[2] Bar-Ilan University,undefined
[3] Ramat Gan 52900,undefined
来源
Journal of Cryptology | 2006年 / 19卷
关键词
Public-key encryption; Adaptive chosen-ciphertext attacks; Simulation-sound non-interactive zero-knowledge;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor--Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.
引用
收藏
页码:359 / 377
页数:18
相关论文
共 50 条
  • [41] Secure Public-Key Encryption from Random Oracle Transformation
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (04) : 1091 - 1105
  • [42] Analysis of Gong et al.'s CCA2-secure homomorphic encryption
    Lee, Hyung Tae
    Ling, San
    Wang, Huaxiong
    THEORETICAL COMPUTER SCIENCE, 2016, 640 : 104 - 114
  • [43] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
    Zhou, Yanwei
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
  • [44] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795
  • [45] Simple and Efficient KDM-CCA Secure Public Key Encryption
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Tanaka, Keisuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 97 - 127
  • [46] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [47] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Jun'ichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 707 - 711
  • [48] Deterministic Public-Key Encryption Under Continual Leakage
    Koppula, Venkata
    Pandey, Omkant
    Rouselakis, Yannis
    Waters, Brent
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 304 - 323
  • [49] Forward-secure Public-Key Encryption Scheme with Tamper Evidence
    Jiang Han
    Xu QiuLiang
    Hou MengBo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 656 - 659
  • [50] A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors)
    Bessonov, Mariya
    Grigoriev, Dima
    Shpilrain, Vladimir
    MATHEMATICAL SOFTWARE - ICMS 2018, 2018, 10931 : 45 - 54