scispace - formally typeset
Open AccessBook ChapterDOI

Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message

Reads0
Chats0
TLDR
This paper provides a new scheme in OAEP framework based on Sponge construction and calls it Sponge based asymmetric encryption padding (SpAEP), which is CCA2 secure for any trapdoor one-way permutation in the ideal permutation model for arbitrary length messages.
Abstract
OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme Sponge based asymmetric encryption padding (SpAEP). SpAEP is based on 2 functions: Sponge and SpongeWrap, and requires only standard output sizes proposed and standardized for Sponge functions. Our scheme is CCA2 secure for any trapdoor one-way permutation in the ideal permutation model for arbitrary length messages. Our scheme utilizes the versatile Sponge function to enhance the capability and efficiency of the OAEP framework. SpAEP with any trapdoor one-way permutation can also be used as a key encapsulation mechanism and a tag-based key encapsulation mechanism for hybrid encryption. Our scheme SpAEP utilizes the permutation model efficiently in the setting of public key encryption in a novel manner.

read more

Citations
More filters
Dissertation

Designing generic asymmetric key cryptosystem with message paddings

TL;DR: New effective padding schemes are proposed and able to mitigate the various computation and memory overhead compared to previous works and also able to provide streaming capability which was missing in most of the previous works.
Journal ArticleDOI

Heterogeneous deniable authenticated encryption for location-based services.

TL;DR: In this paper, the authors proposed a heterogeneous deniable authenticated encryption (HDAE) scheme for location-based services, which permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment.
Journal ArticleDOI

Signcryption schemes with insider security in an ideal permutation model

TL;DR: This work designs a generic and efficient signcryption scheme featuring parallel encryption and signature on top of a sponge-based message-padding underlying structure, and proves the construction secure when instantiated from weakly secure asymmetric primitives such as a trapdoor one-way encryption and a universal unforgeable signature.
Book ChapterDOI

Heterogeneous Deniable Authenticated Encryption Protocol

TL;DR: This paper proposes a heterogeneous deniable authenticated encryption scheme called HDAE, which permits a sender in a public key infrastructure environment to transmit a message to a receiver in an identity-based environment and construct an HDATK scheme and provide security proof in the random oracle model.
Journal ArticleDOI

EBIAC: Efficient biometric identity-based access control for wireless body area networks

TL;DR: In this paper, a biometric identity-based privacy-preserving scheme was proposed for WBAN, where a user's identity can be constructed from its biometric information, and the proposed access control scheme provided confidentiality, authentication, integrity, non-repudiation and anonymity in the random oracle model.
References
More filters
Journal ArticleDOI

Chosen Ciphertext Security with Optimal Ciphertext Overhead

TL;DR: This work proposes an IND-CCA secure scheme whose ciphertext overhead matches the generic lower bound up to a small constant and belongs to the family of OAEP-based schemes.
Book ChapterDOI

Reset Indifferentiability and Its Consequences

TL;DR: In this article, the equivalence of the random-oracle model and the ideal-cipher model has been studied in a long series of results and Demay et al. showed that reset-indifferentiability is equivalent to reset indifferentiability.
Posted Content

Reset Indifferentiability and its Consequences.

TL;DR: In this article, the equivalence of the random-oracle model and the ideal-cipher model has been studied in a long series of results and Demay et al. showed that reset-indifferentiability is equivalent to reset indifferentiability.