Journal ArticleDOI
A generic construction of CCA-secure deterministic encryption
Reads0
Chats0
TLDR
The approach is a generic construction based on the identity-based lossy trapdoor functions (IB-LTDF), and it also can be extended to design CCA secure deterministic identity- based encryption schemes (D-IBE).About:
This article is published in Information Processing Letters.The article was published on 2020-02-01. It has received 7 citations till now. The article focuses on the topics: Deterministic encryption & Ciphertext.read more
Citations
More filters
Journal Article
Hedging Public-Key Encryption in the Real World.
TL;DR: A simple and elegant theoretical approach to building PKE schemes is to synthesize fresh random bits by hashing all of the encryption inputs, and use the resulting hash output as randomness for an underlying PKE scheme as mentioned in this paper.
Journal ArticleDOI
Pairing-Free for Public Key Encryption With Equality Test Scheme
TL;DR: In this paper, an efficient public key encryption scheme with equality test (PKEwET) is proposed, which employs discrete logarithm to improve the computational efficiency and introduces the verification process during the test phase to validate the ciphertext.
Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE
TL;DR: A new HIBE scheme that is secure against adaptive chosen-ciphertext attacks (CCA) is constructed, whose security is based on the hardness of the shortest vector problem (SVP).
Journal ArticleDOI
New constructions of equality test scheme for cloud-assisted wireless sensor networks.
TL;DR: In this paper, an efficient RSA with equality test algorithm is proposed for cloud-assisted wireless sensor networks (CWSNs) to maintain data privacy, which is proved to be one-way against chosen-ciphertext attack security and indistinguishable against chosen ciphertext attacks.
Book ChapterDOI
Updatable All-But-One Dual Projective Hashing and Its Applications.
TL;DR: In this article, the authors introduce the notion of updatable all-but-one dual projective hashing (UDPH), which can be instantiated with k-LIN, DCR, QR and LWE assumptions in the standard model.
References
More filters
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Proceedings ArticleDOI
Public-key cryptosystems provably secure against chosen ciphertext attacks
Moni Naor,Moti Yung +1 more
TL;DR: This work shows how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given aPublic-Key cryptosystern secure against passive eavesdropping and a noninteractive zero-knowledge proof system in the shared string model.
Book ChapterDOI
Chosen-Ciphertext Security from Identity-Based Encryption
TL;DR: This work proposes a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme, which avoids non-interactive proofs of “well-formedness” which were shown to underlie most previous constructions.
Posted Content
Chosen-Ciphertext Security from Identity-Based Encryption.
TL;DR: In this article, the authors proposed a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme.
Book ChapterDOI
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
TL;DR: In this article, the authors present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen ciphertext attack, and introduce a general framework that allows one to construct secure encryption schemes from language membership problems.