File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: A secure public key encryption from computational linear Diffe-Hellman problem

TitleA secure public key encryption from computational linear Diffe-Hellman problem
Authors
KeywordsCCA secure
DLDH assumption
Public key encryption
Issue Date2012
Citation
Proceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012, 2012, p. 464-468 How to Cite?
AbstractThis paper proposes a practical public key encryption scheme which is provable chosen cipher text(CCA) secure based on the gap computational linear Diffie-Hellman assumption in the standard model. This is the first CCA secure scheme based on the gap computational linear Diffie-Hellman assumption. This scheme is efficient and the proof of the security is tight. We also reduce the size of the public key from n to 2√n based on the twin gap computational linear Diffie-Hellman assumption. And the time for encryption and decryption is significantly reduced. And we point out that a generalization of the scheme can be constructed similarly based on the gap k-computational linear assumption. © 2012 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/311936
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorTian, Fengqing-
dc.contributor.authorXue, Haili-
dc.contributor.authorXue, Haiyang-
dc.date.accessioned2022-04-06T04:31:48Z-
dc.date.available2022-04-06T04:31:48Z-
dc.date.issued2012-
dc.identifier.citationProceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012, 2012, p. 464-468-
dc.identifier.urihttp://hdl.handle.net/10722/311936-
dc.description.abstractThis paper proposes a practical public key encryption scheme which is provable chosen cipher text(CCA) secure based on the gap computational linear Diffie-Hellman assumption in the standard model. This is the first CCA secure scheme based on the gap computational linear Diffie-Hellman assumption. This scheme is efficient and the proof of the security is tight. We also reduce the size of the public key from n to 2√n based on the twin gap computational linear Diffie-Hellman assumption. And the time for encryption and decryption is significantly reduced. And we point out that a generalization of the scheme can be constructed similarly based on the gap k-computational linear assumption. © 2012 IEEE.-
dc.languageeng-
dc.relation.ispartofProceedings of the 2012 8th International Conference on Computational Intelligence and Security, CIS 2012-
dc.subjectCCA secure-
dc.subjectDLDH assumption-
dc.subjectPublic key encryption-
dc.titleA secure public key encryption from computational linear Diffe-Hellman problem-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/CIS.2012.110-
dc.identifier.scopuseid_2-s2.0-84873563147-
dc.identifier.spage464-
dc.identifier.epage468-
dc.identifier.isiWOS:000318241200102-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats