scispace - formally typeset
Journal ArticleDOI

A generic construction of CCA-secure deterministic encryption

Reads0
Chats0
TLDR
The approach is a generic construction based on the identity-based lossy trapdoor functions (IB-LTDF), and it also can be extended to design CCA secure deterministic identity- based encryption schemes (D-IBE).
About
This article is published in Information Processing Letters.The article was published on 2020-02-01. It has received 7 citations till now. The article focuses on the topics: Deterministic encryption & Ciphertext.

read more

Citations
More filters
Journal Article

Hedging Public-Key Encryption in the Real World.

TL;DR: A simple and elegant theoretical approach to building PKE schemes is to synthesize fresh random bits by hashing all of the encryption inputs, and use the resulting hash output as randomness for an underlying PKE scheme as mentioned in this paper.
Journal ArticleDOI

Pairing-Free for Public Key Encryption With Equality Test Scheme

TL;DR: In this paper, an efficient public key encryption scheme with equality test (PKEwET) is proposed, which employs discrete logarithm to improve the computational efficiency and introduces the verification process during the test phase to validate the ciphertext.

Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE

TL;DR: A new HIBE scheme that is secure against adaptive chosen-ciphertext attacks (CCA) is constructed, whose security is based on the hardness of the shortest vector problem (SVP).
Journal ArticleDOI

New constructions of equality test scheme for cloud-assisted wireless sensor networks.

TL;DR: In this paper, an efficient RSA with equality test algorithm is proposed for cloud-assisted wireless sensor networks (CWSNs) to maintain data privacy, which is proved to be one-way against chosen-ciphertext attack security and indistinguishable against chosen ciphertext attacks.
Book ChapterDOI

Updatable All-But-One Dual Projective Hashing and Its Applications.

TL;DR: In this article, the authors introduce the notion of updatable all-but-one dual projective hashing (UDPH), which can be instantiated with k-LIN, DCR, QR and LWE assumptions in the standard model.
References
More filters
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Proceedings ArticleDOI

Public-key cryptosystems provably secure against chosen ciphertext attacks

Moni Naor, +1 more
TL;DR: This work shows how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given aPublic-Key cryptosystern secure against passive eavesdropping and a noninteractive zero-knowledge proof system in the shared string model.
Book ChapterDOI

Chosen-Ciphertext Security from Identity-Based Encryption

TL;DR: This work proposes a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme, which avoids non-interactive proofs of “well-formedness” which were shown to underlie most previous constructions.
Posted Content

Chosen-Ciphertext Security from Identity-Based Encryption.

TL;DR: In this article, the authors proposed a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme.
Book ChapterDOI

Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption

TL;DR: In this article, the authors present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen ciphertext attack, and introduce a general framework that allows one to construct secure encryption schemes from language membership problems.
Related Papers (5)