A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1304978
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Yvo G. Desmedt / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: KEM-DEM / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-009-9051-4 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2027262679 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q121008916 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tag-KEM/DEM: A new framework for hybrid encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hybrid Encryption from Weakened Key Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374914 / rank
 
Normal rank

Latest revision as of 11:42, 2 July 2024

scientific article
Language Label Description Also known as
English
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
scientific article

    Statements

    A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    1 March 2010
    0 references
    A hybrid encryption scheme [\textit{V. Shoup}, EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14--18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1807, 275--288 (2000; Zbl 1082.94530)] works in two steps: first using public-key encryption techniques a shared key between sender and receiver is determined, next, this key is used to encrypt the actual message via symmetric-key techniques. If each of the parts of the hybrid cryptosystem is chosen-ciphertext secure, then the resulting hybrid system also is. This paper presents a modification of the above scheme. Combining two separate results from [http://eprint.iacr.org/2004/194] and [\textit{K. Kurosawa, Y. Desmedt}, Advances in cryptology -- CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15--19, 2004. Proceedings. Berlin: Springer. Lecture Notes in Computer Science 3152, 426--442 (2004; Zbl 1104.94028)] the scheme that saves the computation of one exponentiation and produces shorter ciphertexts has been obtained. This scheme is secure against adaptive chosen-ciphertext attack for all that its first part is not. It has been shown that: (i) the security holds also if projective hash families (as in [\textit{J. F. Martinez-Trinidad, J. Ruiz-Shulcloper}, Pattern Recognition 34, No.4, 783-793 (2001; Zbl 0969.68067)]) are used; (ii) in the random oracle model the security under the weaker computational Diffie-Hellman assumption can be proved.
    0 references
    public key encryption
    0 references
    chosen ciphertext security
    0 references
    projective hash proofs
    0 references

    Identifiers