【24h】

The KDM-CCA Security of REACT

机译:KACTA的REACT安全性

获取原文

摘要

In CT-RSA 2001, Okamoto and Pointcheval proposed a general conversion: Rapid enhanced-security asymmetric cryptosystem transform (REACT, for short), which achieves the CCA security in the random oracle from very weak building blocks and is (almost) optimal in terms of computational overload. In this paper, we consider the key-dependent message (KDM) security of REACT and prove that it can be KDM-CCA secure under exactly the same assumptions on its building blocks as those used by Okamoto and Pointcheval. When presenting our proof, we mainly adopt the deferred-analysis technique proposed in [25] and the random-oracle-splitting technique which has been used in [17,23] according to the roles of the random oracles in different phases.
机译:在CT-RSA 2001中,Okamoto和Pointcheval提出了一种通用转换:快速增强安全性非对称密码系统转换(简称REACT),该转换通过非常弱的构造块在随机预言机中实现了CCA安全性,并且(在最佳方面)计算过载。在本文中,我们考虑了REACT的密钥相关消息(KDM)安全性,并证明了在与Okamoto和Pointcheval所使用的构建块完全相同的假设下,它可以是KDM-CCA安全的。在介绍我们的证据时,我们主要根据随机Oracle在不同阶段的作用,采用[25]中提出的延迟分析技术和[17,23]中已使用的随机Oracle拆分技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号