首页> 外文会议>European workshop on public key infrastructures, services, and applications >Efficient Public Key Encryption Admitting Decryption by Sender
【24h】

Efficient Public Key Encryption Admitting Decryption by Sender

机译:高效的公钥加密承认发件人解密

获取原文

摘要

This paper investigates public key encryption that has a desirable feature of allowing the sender of a ciphertext to recover the original plaintext from the ciphertext without relying on a recipient's private decryption key (PKE-SR). We propose two efficient methods for converting KEM/DEM to PKE-SR. The first method, called pre-KEM seeding, can be applied to a large class of KEM/DEM constructions including those based on the discrete logarithm problem. The second method, called post-KEM converging, is more powerful and can be employed to convert any secure KEM/DEM into a secure PKE-SR. Post-KEM converging takes advantages of an interesting property, called collision accessibility, of sibling intractable hashing. For both methods, added costs in ciphertext length and computation are minimal, making them a particularly attractive "drop-in" replacement in applications where plaintexts need to be recovered efficiently by the sender alone.
机译:本文调查了具有允许密码发件人从密文中恢复原始明文的所需功能的公钥加密,而无需依赖于收件人的私有解密密钥(PKE-SR)。我们提出了两种有效的方法,将KEM / DEM转换为PKE-SR。第一种方法称为KEM播种,可以应用于一大类KEM / DEM结构,包括基于离散对数问题的结构。第二种方法称为KEM融合,更强大,可以用来将任何安全的KEM / DEM转换为安全的PKE-SR。后KEM融合的优点是兄弟难以应变散列的有趣属性的有趣特性。对于这两种方法,密文长度和计算中的增加成本最小,使得它们在申请中替换了特别有吸引力的“删除”,其中由发件人单独通过发件人有效地恢复。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号