Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
نویسندگان
چکیده
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion from any stag-CCAsecure threshold tag-based encryption schemes to CCA-secure threshold public-key encryption schemes. Moreover, we give two concrete constructions of stag-CCA-secure threshold tag-based encryption schemes, under the decisional bilinear Diffie-Hellman assumption and the decisional linear assumption, respectively. Thus, we obtain two concrete constructions of threshold public-key encryption schemes, both of which are non-interactive, robust and can be proved secure without random oracle model. Our threshold public-key encryption schemes are conceptually more simple and shown to be more efficient than those of Boneh, Boyen
منابع مشابه
Analysis of Simplified DES Algorithms
The Data Encryption Standard (DES) is no longer secure because of its small key size. One way to augment the keyspace is to perform multiple encryptions with DES. This paper examines the cryptographic consequences of multiple encryptions with DES through two simplified DES algorithms. Both simplified algorithms, under multiple encryptions, generate the alternating group of permutations on the m...
متن کاملDistributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance
In this paper, a construction of distributed multi-user, multikey searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-Hellman function and the ElGamal encryption scheme to provide high reliability with limited storage overhead. It achieves the semantic security in the context of the keyword hiding, the sear...
متن کاملEnhanced Flush+Reload Attack on AES
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
متن کاملCircular Chosen-Ciphertext Security with Compact Ciphertexts
A key-dependent message (KDM) secure encryption scheme is secure even if an adversary obtains encryptions of messages that depend on the secret key. Such key-dependent encryptions naturally occur in scenarios such as harddisk encryption, formal cryptography, or in specific protocols. However, there are not many provably secure constructions of KDM-secure encryption schemes. Moreover, only one c...
متن کاملOn Chosen Ciphertext Security of Multiple Encryptions
We consider the security of multiple and possibly related plaintexts in the context of a chosen ciphertext attack. That is the attacker in addition and concurrently to obtaining encryptions of multiple plaintexts under the same key, may issue encryption and decryption queries and partial information queries. Loosely speaking, an encryption scheme is considered secure under such attacks if all t...
متن کامل