PSEC: Provably Secure Elliptic Curve Encryption Scheme (Submission to P1363a)
نویسندگان
چکیده
We describe an elliptic curve encryption scheme, PSEC (provably secure elliptic curve encryption scheme), which has two versions: PSEC-1 and PSEC-2. PSEC-1 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function and a random function (hash function). PSEC-2 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function, two random functions (hash functions) and a symmetrickey encryption (e.g., one-time padding and block-ciphers). PSEC has several outstanding properties as follows: 1. PSEC-1 is semantically secure or non-malleable against chosen ciphertext attacks (INDCCA2 or NM-CCA2) in the random oracle model under the elliptic curve decision Diffie-Hellman (EC-DDH) assumption. 2. PSEC-2 with one-time padding is semantically secure or non-malleable against chosen ciphertext attacks (IND-CCA2 or NM-CCA2) in the random oracle model under the elliptic curve Diffie-Hellman (EC-DH) assumption. 3. PSEC-2 with symmetric encryption is semantically secure or non-malleable against chosen ciphertext attacks (IND-CCA2 or NM-CCA2) in the random oracle model under the elliptic curve Diffie-Hellman (EC-DH) assumption, if the underlying symmetric encryption is secure against passive attacks. 4. If the underlying random function is replaced by a practical random like function (e.g., SHA and MD5), PSEC is almost as efficient as the elliptic curve ElGamal scheme, and is almost three times as efficient as the elliptic curve Cramer-Shoup scheme. The encryption scheme described in this contribution is obtained by using two results on conversion techniques using random functions [10, 11].
منابع مشابه
Psec{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (submission to P1363a)
We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we dene a new prob...
متن کاملPSEC { 3 : Provably Secure Elliptic Curve Encryption Scheme { V 3 (
We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we de ne a new pro...
متن کاملPractical Identification Schemes as Secure as the DL and RSA problems (Submission to P1363a)
We present a practical three-move interactive identification scheme, ID-DL, and prove it to be as secure as the discrete logarithm problem. ID-DL is almost as efficient as the Schnorr identification scheme, which is not provably secure. We also present another practical identification scheme, ID-RSA, which is proven to be as secure as the RSA problem and almost as efficient as the Guillou-Quisq...
متن کاملA Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999