Group signature implies public-key encryption with non-interactive opening

被引:0
|
作者
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Jacob C. N. Schuldt
机构
[1] National Institute of Information and Communications Technology,Network Security Research Institute
[2] National Institute of Advanced Industrial Science and Technology,Research Institute for Secure Systems
[3] The University of Electro-Communications,Department of Informatics
[4] University of London,Information Security Group, Royal Holloway
关键词
Group signature; Public-key encryption with non-interactive opening;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we show that public-key encryption with non-interactive opening (PKENO) can be constructed from an arbitrary group signature (GS) scheme which is secure in the dynamic group setting and provides opening soundness. Moreover, the resulting PKENO construction is efficient if the underlying GS scheme is efficient and the message space of the PKENO scheme is restricted to short messages. Hence, our result not only shows that the existence of this type of GS implies the existence of PKENO, but also that designing a practical GS scheme is as difficult as designing a practical PKENO scheme. Our transform is constructed by carefully investigating the relationship between the functionalities of GS and that of PKENO, and developing a novel (but specific) multiple encryption technique. This multiple encryption technique plays an important role for simultaneously achieving both practical efficiency and security.
引用
收藏
页码:51 / 62
页数:11
相关论文
共 50 条
  • [1] Group signature implies public-key encryption with non-interactive opening
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 51 - 62
  • [2] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [3] Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions
    Galindo, David
    Libert, Benoit
    Fischlin, Marc
    Fuchsbauer, Georg
    Lehmann, Anja
    Manulis, Mark
    Schroeder, Dominique
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 333 - +
  • [4] Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
    Sakai, Yusuke
    Matsuda, Takahiro
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (11): : 2677 - 2687
  • [5] Tag-KEM/DEM Framework for Public-key Encryption with Non-interactive Opening
    Sakai, Yusuke
    Matsuda, Takahiro
    Hanaoka, Goichiro
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 231 - 235
  • [6] Disavowable Public Key Encryption with Non-Interactive Opening
    Ishida, Ai
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Tanaka, Keisuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (12) : 2446 - 2455
  • [7] UC-Secure Non-Interactive Public-Key Encryption
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Samelin, Kai
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 217 - 233
  • [8] Adaptively-secure, non-interactive public-key encryption
    Canetti, R
    Halevi, S
    Katz, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 150 - 168
  • [9] Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 181 - +
  • [10] SKENO: Secret key encryption with non-interactive opening
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 63 - 74