首页> 外文期刊>Security and Communications Networks >Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions
【24h】

Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions

机译:基于决策复合残差和二次残差假设的实用密钥相关消息选择-密文安全性

获取原文
获取原文并翻译 | 示例
           

摘要

An encryption scheme is key-dependent message chosen plaintext attack (KDM-CPA) secure if it is secure even against an attacker who has access to encryptions of messages that depend on the secret key. Such situations naturally occur in some scenarios such as formal calculus, hard-disk encryption, or multi-party protocols. However, up to now, there are not many schemes that achieve KDM-CPA security, let alone KDM chosen ciphertext attack (KDM-CCA) security. The constructions proposed by Camenisch, Chandran, and Shoup (Eurocrypt 2009), and Hofheinz (Eurocrypt 2013) are the only two general constructions that can be proved to be KDM-CCA secure in the standard model. Besides, Qin, Liu, and Huang (ACISP 2013) also presented another concrete implementation. In particular, they showed how to obtain KDM-CCA security from the classic Cramer-Shoup cryptosystem (based on the decisional Diffie-Hellman assumption) w.r.t. a new ensemble of functions (we call QLH ensemble). Since the Cramer-Shoup scheme has short ciphertext size and higher computational efficiency, they obtain practical KDM-CCA security w.r.t. a reasonably large ensemble.In this paper, we study the KDM-CCA security of other cryptosystems proposed by Cramer and Shoup (Eurocrypt 2002). In particular, we prove that the schemes, based on decisional composite residuosity (DCR) and quadratic residuosity (QR) assumptions, respectively, also achieve KDM-CCA security w.r.t. the QLH ensemble. On the one hand, because the DCR-based and QR-based schemes of Cramer et al. are fairly practical, we also obtain practical KDM-CCA security based on DCR and QR assumptions, respectively. On the other hand, compared with the result of Qin et al., we need not tailor the original schemes of Cramer et al. because themselves have natural compatibility for the message space and the secret key space. Copyright (c) 2014 John Wiley & Sons, Ltd.
机译:加密方案是密钥依赖的消息选择的纯文本攻击(KDM-CPA),即使它对可以访问依赖于秘密密钥的消息加密的攻击者而言也很安全。在某些情况下(例如形式演算,硬盘加密或多方协议)自然会发生这种情况。但是,到目前为止,尚无许多方案可以实现KDM-CPA安全性,更不用说KDM选择了密文攻击(KDM-CCA)安全性。 Camenisch,Chandran和Shoup(Eurocrypt 2009)和Hofheinz(Eurocrypt 2013)提出的构造是在标准模型中可以证明是KDM-CCA安全的仅有的两种通用构造。此外,秦,刘和黄(ACISP,2013年)也提出了另一种具体的实施方案。特别是,他们展示了如何从经典的Cramer-Shoup密码系统(基于决策Diffie-Hellman假设)获得KDM-CCA安全性。一个新的功能集合(我们称为QLH集合)。由于Cramer-Shoup方案的密文大小短且计算效率更高,因此他们获得了实用的KDM-CCA安全性。本文研究了Cramer和Shoup提出的其他密码系统的KDM-CCA安全性(Eurocrypt 2002)。特别是,我们证明了基于决策复合残差(DCR)和二次残差(QR)假设的方案也分别实现了KDM-CCA安全性。 QLH合奏。一方面,因为Cramer等人的基于DCR和QR的方案相当实用,我们还分别基于DCR和QR假设获得了实用的KDM-CCA安全性。另一方面,与Qin等人的结果相比,我们不需要定制Cramer等人的原始方案。因为它们本身对消息空间和密钥空间具有自然的兼容性。版权所有(c)2014 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号