...
首页> 外文期刊>IEICE Transactions on fundamentals of electronics, communications & computer sciences >Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting
【24h】

Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting

机译:Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting

获取原文
获取原文并翻译 | 示例

摘要

In 1, Bellare, Boldyreva, and Micali addressed the security of public-key encryptions (PKEs) in a multi-user setting (called the BBM model in this paper). They showed that although the indistinguisha-bility in the BBM model is induced from that in the conventional model, its reduction is far from tight in general, and this brings a serious key length problem. In this paper, we discuss PKE schemes in which the IND-CCA security in the BBM model can be obtained tightly from the IND-CCA security. We call such PKE schemes IND-CCA secure in the BBM model with invariant security reductions {briefly, SR-invariant IND-CCA~(BBM) secure). These schemes never suffer from the underlying key length problem in the BBM model. We present three instances of an SR-invariant IND-CCA~(BBM) secure PKE scheme: the first is based on the Fujisaki-Okamoto PKE scheme 7, the second is based on the Bellare-Rogaway PKE scheme 3, and the last is based on the Cramer-Shoup PKE scheme 5.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号