首页> 外文会议>Annual International Cryptology Conference >Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
【24h】

Reproducible Circularly-Secure Bit Encryption: Applications and Realizations

机译:可重复的圆形安全位加密:应用程序和实现

获取原文

摘要

We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property (Bellare et al. PKC 2003). At the heart of our constructions is a novel technique which gives a way of de-randomizing reproducible public-key bit-encryption schemes and also a way of reducing one-wayness conditions of a constructed trapdoor-function family (TDF) to circular security of the base scheme. The main primitives that we build from our encryption primitive include k-wise one-way TDFs (Rosen and Segev TCC 2009), CCA2-secure encryption and deterministic encryption. Our results demonstrate a new set of applications of circularly-secure encryption beyond fully-homomorphic encryption and symbolic soundness. Finally, we show the plausibility of our assumptions by showing that the DDH-based circularly-secure scheme of Boneh et al. (Crypto 2008) and the subgroup indistin-guishability based scheme of Brakerski and Goldwasser (Crypto 2010) are both reproducible.
机译:我们基于新的加密原语提供了几个基本的基元的通用结构,该原语与所谓的再现性属性相结合的循环安全性(Bellare等人。PKC 2003)。在我们的结构中,构造是一种新颖的技术,它给出了一种脱离可再现的公钥位加密方案的方式,以及将构建的Trapdoor-Function系列(TDF)的单向条件减少到圆形安全的方式基准方案。我们从加密原语构建的主要基因包括K-Wise单向TDFS(Rosen和Segev TCC 2009),CCA2安全加密和确定性加密。我们的结果展示了超出完全同态加密和象征性的循环安全加密的新应用。最后,我们通过表明Boneh等人的DDH的圆形安全方案来表明我们的假设的合理性。 (Crypto 2008)和Brakerski和Goldwasser(Crypto 2010)的基于亚群Indistin-Guistinability的方案既可重复。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号