Group signature implies public-key encryption with non-interactive opening

被引:0
|
作者
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Jacob C. N. Schuldt
机构
[1] National Institute of Information and Communications Technology,Network Security Research Institute
[2] National Institute of Advanced Industrial Science and Technology,Research Institute for Secure Systems
[3] The University of Electro-Communications,Department of Informatics
[4] University of London,Information Security Group, Royal Holloway
关键词
Group signature; Public-key encryption with non-interactive opening;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we show that public-key encryption with non-interactive opening (PKENO) can be constructed from an arbitrary group signature (GS) scheme which is secure in the dynamic group setting and provides opening soundness. Moreover, the resulting PKENO construction is efficient if the underlying GS scheme is efficient and the message space of the PKENO scheme is restricted to short messages. Hence, our result not only shows that the existence of this type of GS implies the existence of PKENO, but also that designing a practical GS scheme is as difficult as designing a practical PKENO scheme. Our transform is constructed by carefully investigating the relationship between the functionalities of GS and that of PKENO, and developing a novel (but specific) multiple encryption technique. This multiple encryption technique plays an important role for simultaneously achieving both practical efficiency and security.
引用
收藏
页码:51 / 62
页数:11
相关论文
共 50 条
  • [31] LUC - PUBLIC-KEY ENCRYPTION
    SMITH, P
    DR DOBBS JOURNAL, 1993, 18 (01): : 44 - &
  • [32] Multipurpose Public-Key Encryption
    Zhang, Rui
    He, Kai
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 69 - 84
  • [33] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Soni, Lacchita
    Chandra, Harish
    Gupta, Daya Sagar
    Keval, Ram
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01): : 285 - 297
  • [34] Quantum-resistant public-key encryption and signature schemes with smaller key sizes
    Lacchita Soni
    Harish Chandra
    Daya Sagar Gupta
    Ram Keval
    Cluster Computing, 2024, 27 : 285 - 297
  • [35] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    INFORMATION SECURITY, 2011, 7001 : 102 - +
  • [36] Non-Interactive Key Exchange from Identity-Based Encryption
    Blazy, Olivier
    Chevalier, Celine
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [37] Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
    Duman, Julien
    Hartmann, Dominik
    Kiltz, Eike
    Kunzweiler, Sabrina
    Lehmann, Jonas
    Riepel, Doreen
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT II, 2022, 13792 : 36 - 66
  • [38] Selective-Opening Security for Public-Key Encryption in the Presence of Parameter Subversion
    Kang B.
    Huang Z.
    Zhang L.
    Security and Communication Networks, 2021, 2021
  • [39] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [40] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455