File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-89500-0_13
- Scopus: eid_2-s2.0-85045997172
- WOS: WOS:000460414100013
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Towards tightly secure deterministic public key encryption
Title | Towards tightly secure deterministic public key encryption |
---|---|
Authors | |
Keywords | Deterministic public key encryption Lossy trapdoor functions Standard model Tight security reduction |
Issue Date | 2018 |
Publisher | Springer |
Citation | 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017. In Qing, S, Mitchell, C, Chen, L, et al. (Eds), Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, p. 154-161. Cham, Switzerland : Springer, 2018 How to Cite? |
Abstract | In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc*) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND- n/2 -CCA secure (i.e., the number of challenge ciphertexts nc* is bounded by n/2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND- n/2 -CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND- n/2 -CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption. |
Persistent Identifier | http://hdl.handle.net/10722/312036 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID | |
Series/Report no. | Lecture Notes in Computer Science ; 10631 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Daode | - |
dc.contributor.author | Li, Bao | - |
dc.contributor.author | Liu, Yamin | - |
dc.contributor.author | Xue, Haiyang | - |
dc.contributor.author | Lu, Xianhui | - |
dc.contributor.author | Jia, Dingding | - |
dc.date.accessioned | 2022-04-06T04:32:02Z | - |
dc.date.available | 2022-04-06T04:32:02Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017. In Qing, S, Mitchell, C, Chen, L, et al. (Eds), Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, p. 154-161. Cham, Switzerland : Springer, 2018 | - |
dc.identifier.isbn | 9783319894997 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/312036 | - |
dc.description.abstract | In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc*) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND- n/2 -CCA secure (i.e., the number of challenge ciphertexts nc* is bounded by n/2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND- n/2 -CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND- n/2 -CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption. | - |
dc.language | eng | - |
dc.publisher | Springer | - |
dc.relation.ispartof | Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; 10631 | - |
dc.subject | Deterministic public key encryption | - |
dc.subject | Lossy trapdoor functions | - |
dc.subject | Standard model | - |
dc.subject | Tight security reduction | - |
dc.title | Towards tightly secure deterministic public key encryption | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-89500-0_13 | - |
dc.identifier.scopus | eid_2-s2.0-85045997172 | - |
dc.identifier.spage | 154 | - |
dc.identifier.epage | 161 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000460414100013 | - |
dc.publisher.place | Cham, Switzerland | - |