File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Towards tightly secure deterministic public key encryption

TitleTowards tightly secure deterministic public key encryption
Authors
KeywordsDeterministic public key encryption
Lossy trapdoor functions
Standard model
Tight security reduction
Issue Date2018
PublisherSpringer
Citation
19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017. In Qing, S, Mitchell, C, Chen, L, et al. (Eds), Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, p. 154-161. Cham, Switzerland : Springer, 2018 How to Cite?
AbstractIn this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc*) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND- n/2 -CCA secure (i.e., the number of challenge ciphertexts nc* is bounded by n/2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND- n/2 -CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND- n/2 -CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption.
Persistent Identifierhttp://hdl.handle.net/10722/312036
ISBN
ISSN
2023 SCImago Journal Rankings: 0.606
ISI Accession Number ID
Series/Report no.Lecture Notes in Computer Science ; 10631

 

DC FieldValueLanguage
dc.contributor.authorZhang, Daode-
dc.contributor.authorLi, Bao-
dc.contributor.authorLiu, Yamin-
dc.contributor.authorXue, Haiyang-
dc.contributor.authorLu, Xianhui-
dc.contributor.authorJia, Dingding-
dc.date.accessioned2022-04-06T04:32:02Z-
dc.date.available2022-04-06T04:32:02Z-
dc.date.issued2018-
dc.identifier.citation19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017. In Qing, S, Mitchell, C, Chen, L, et al. (Eds), Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, p. 154-161. Cham, Switzerland : Springer, 2018-
dc.identifier.isbn9783319894997-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/312036-
dc.description.abstractIn this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc*) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND- n/2 -CCA secure (i.e., the number of challenge ciphertexts nc* is bounded by n/2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND- n/2 -CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND- n/2 -CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption.-
dc.languageeng-
dc.publisherSpringer-
dc.relation.ispartofInformation and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings-
dc.relation.ispartofseriesLecture Notes in Computer Science ; 10631-
dc.subjectDeterministic public key encryption-
dc.subjectLossy trapdoor functions-
dc.subjectStandard model-
dc.subjectTight security reduction-
dc.titleTowards tightly secure deterministic public key encryption-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-319-89500-0_13-
dc.identifier.scopuseid_2-s2.0-85045997172-
dc.identifier.spage154-
dc.identifier.epage161-
dc.identifier.eissn1611-3349-
dc.identifier.isiWOS:000460414100013-
dc.publisher.placeCham, Switzerland-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats