On a Variation of Kurosawa-Desmedt Encryption Scheme
نویسندگان
چکیده
Kurosawa-Desmedt encryption scheme is a variation of CramerShoup encryption schemes, which are the first practical schemes secure against adaptive chosen ciphertext attack in standard model. We introduce a variant of Kurosawa-Desmedt encryption scheme, which is not only secure against adaptive chosen ciphertext attack but also slightly more efficient than the original version.
منابع مشابه
Kurosawa-Desmedt KEM is not CCA2-secure
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is CCA2-secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not. In this note we answer this question to the negative, namely we present a simple CCA2 attack on the Kurosawa-Desmedt key encapsulation mechanism. Our a...
متن کاملA Note on An Encryption Scheme of Kurosawa and Desmedt
Recently, Kurosawa and Desmedt presented a new hybrid encryption scheme which is secure against adaptive chosen-ciphertext attack. Their scheme is a modification of the Cramer-Shoup encryption scheme. Its major advantage with respect to CramerShoup is that it saves the computation of one exponentiation and produces shorter ciphertexts. However, the proof presented by Kurosawa and Desmedt relies...
متن کاملThe Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure
At CRYPTO 2004, Kurosawa and Desmedt presented a hybrid public-key encryption scheme that is chosen-ciphertext secure in the standard model. Until now it was unknown if the key-encapsulation part of the Kurosawa-Desmedt scheme by itself is still chosenciphertext secure or not. In this short note we answer this question to the negative, namely we present a simple chosen-ciphertext attack on the ...
متن کاملBetween Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), and is stronger than the computational DH assumption. We then present two public key encryption schemes with short ciphertexts which are both chosen-ciphertext secure under this assumption. The short-message scheme has ...
متن کاملSome Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model
In this paper, we present some more results about the security of the Kurosawa-Desmedt encryption scheme [9] and a variant of it [13]. We prove that after a modification, those schemes are secure against adaptive chosen-ciphertext attack not only under the decisional DiffieHellman assumption in standard model as before but also under the computational Diffie-Hellman assumption in the random ora...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2006 شماره
صفحات -
تاریخ انتشار 2006