File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2897845.2897921
- Scopus: eid_2-s2.0-84979695258
- WOS: WOS:000390302800079
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Efficient construction of completely non-malleable CCA secure public key encryption
Title | Efficient construction of completely non-malleable CCA secure public key encryption |
---|---|
Authors | |
Keywords | Complete non-malleability Public Key encryption Standard model Chosen-ciphertext attack |
Issue Date | 2016 |
Citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 901-906 How to Cite? |
Abstract | © 2016 ACM. Non-malleability is an important and intensively studied security notion for many cryptographic primitives. In the context of public key encryption, this notion means it is infeasible for an adversary to transform an encryption of some message m into one of a related message m' under the given public key. Although it has provided a strong security property for many applications, it still does not suffice for some scenarios like the system where the users could issue keys on-the-y. In such settings, the adversary may have the power to transform the given public key and the ciphertext. To withstand such attacks, Fischlin introduced a stronger notion, known as complete non-malleability, which requires that the non-malleability property be preserved even for the adversaries attempting to produce a ciphertext of some related message under the transformed public key. To date, many schemes satisfying this stronger security have been proposed, but they are either inefficient or proved secure in the random oracle model. In this work, we put forward a new encryption scheme in the common reference string model. Based on the standard DBDH assumption, the proposed scheme is proved completely non-malleable secure against adaptive chosen ciphertext attacks in the standard model. In our scheme, the well-formed public keys and ciphertexts could be publicly recognized without drawing support from unwieldy techniques like non-interactive zero knowledge proofs or one-time signatures, thus achieving a better performance. |
Persistent Identifier | http://hdl.handle.net/10722/260189 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sun, Shi Feng | - |
dc.contributor.author | Gu, Dawu | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Parampalli, Udaya | - |
dc.contributor.author | Yuen, Tsz Hon | - |
dc.date.accessioned | 2018-09-12T02:00:40Z | - |
dc.date.available | 2018-09-12T02:00:40Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, p. 901-906 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260189 | - |
dc.description.abstract | © 2016 ACM. Non-malleability is an important and intensively studied security notion for many cryptographic primitives. In the context of public key encryption, this notion means it is infeasible for an adversary to transform an encryption of some message m into one of a related message m' under the given public key. Although it has provided a strong security property for many applications, it still does not suffice for some scenarios like the system where the users could issue keys on-the-y. In such settings, the adversary may have the power to transform the given public key and the ciphertext. To withstand such attacks, Fischlin introduced a stronger notion, known as complete non-malleability, which requires that the non-malleability property be preserved even for the adversaries attempting to produce a ciphertext of some related message under the transformed public key. To date, many schemes satisfying this stronger security have been proposed, but they are either inefficient or proved secure in the random oracle model. In this work, we put forward a new encryption scheme in the common reference string model. Based on the standard DBDH assumption, the proposed scheme is proved completely non-malleable secure against adaptive chosen ciphertext attacks in the standard model. In our scheme, the well-formed public keys and ciphertexts could be publicly recognized without drawing support from unwieldy techniques like non-interactive zero knowledge proofs or one-time signatures, thus achieving a better performance. | - |
dc.language | eng | - |
dc.relation.ispartof | ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | - |
dc.subject | Complete non-malleability | - |
dc.subject | Public Key encryption | - |
dc.subject | Standard model | - |
dc.subject | Chosen-ciphertext attack | - |
dc.title | Efficient construction of completely non-malleable CCA secure public key encryption | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/2897845.2897921 | - |
dc.identifier.scopus | eid_2-s2.0-84979695258 | - |
dc.identifier.spage | 901 | - |
dc.identifier.epage | 906 | - |
dc.identifier.isi | WOS:000390302800079 | - |