...
首页> 外文期刊>Designs, Codes and Crytography >Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
【24h】

Tightly CCA-secure encryption scheme in a multi-user setting with corruptions

机译:使用损坏的多用户设置中紧密CCA安全加密方案

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The security of public-key encryption (PKE) schemes in a multi-user setting is aimed at capturing real-world scenarios in which an adversary could attack multiple users and multiple ciphertexts of its choice. However, the fact that a real-world adversary can also mount key-exposure attacks for a set of multiple public keys requires us to consider a more realistic notion of security in multi-user settings. In this study, we establish the security notion of PKE in a multi-user settingwith corruptions, where an adversary is able to issue (adaptive) encryption, decryption, and corruption (i.e., private key) queries. We then propose the first practical PKE scheme whose security is proven in a multi-user setting with corruptions. The security of our scheme is based on the computational Diffie-Hellman (CDH) assumption and is proven to be tightly chosen-ciphertext secure in a random oracle model. Our scheme essentially follows the recently proposed modular approach of combining KEM and augmented DEM in a multi-user setting, but we show that this modular approach works well in a multi-user setting with corruptions.
机译:多用户设置中的公钥加密(PKE)方案的安全性旨在捕获真实的方案,其中对手可能会攻击多个用户和其选择的多个密文。但是,真实世界的对手也可以安装一组多个公钥的键曝光攻击的事实要求我们考虑在多用户设置中更具现实的安全性概念。在这项研究中,我们在多用户覆盖中建立了PKE的安全概念,其中对手能够发出(自适应)加密,解密和损坏(即私钥)查询。然后,我们提出了第一个实用的PKE方案,其安全性在具有损坏的多用户设置中被证明。我们的计划的安全性基于计算Diffie-Hellman(CDH)假设,并且被证明是在随机的Oracle模型中紧密选择的 - 密文安全。我们的计划基本上遵循最近提出的模块化方法,可以在多用户设置中结合KEM和增强DEM,但我们表明这种模块化方法在具有损坏的多用户设置中运行良好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号