PSEC { 3 : Provably Secure Elliptic Curve Encryption Scheme { V 3 (

نویسندگان

  • Tatsuaki Okamoto
  • David Pointcheval
چکیده

We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we de ne a new problem, the Elliptic Curve Gap Di e-Hellman problem (EC|Gap{ DH) which is likely stronger than the more classical Elliptic Curve Decision Di e-Hellman (EC{DDH) problem. Indeed, its tractability would imply the equivalence between the Computational and the Decisional versions of the Elliptic Curve Di e-Hellman problem. PSEC{3 therefore has several outstanding properties as follows: 1. with the one-time pad, PSEC{3 is semantically secure or non-malleable against chosen-ciphertext attacks (IND-CCA2 or NM-CCA2), in the random oracle model, under the Elliptic Curve Gap Di e-Hellman (EC{Gap-DH) assumption. 2. with any symmetric encryption, PSEC{3 is semantically secure or non-malleable against chosenciphertext attacks (IND-CCA2 or NM-CCA2), in the random oracle model, under the Elliptic Curve Gap Di e-Hellman (EC{Gap-DH) assumption, if the underlying symmetric encryption is simply semantically secure against passive attacks. 3. if the underlying random functions are replaced by practical random-like functions (e.g., SHA and MD5), PSEC{3 is as e cient as the basic Elliptic Curve El Gamal scheme, for the encryption process but also for the decryption process, which is the major novelty of this new proposal. The encryption scheme described in this contribution is obtained by using a new result on conversion techniques using random functions by the authors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PSEC: Provably Secure Elliptic Curve Encryption Scheme (Submission to P1363a)

We describe an elliptic curve encryption scheme, PSEC (provably secure elliptic curve encryption scheme), which has two versions: PSEC-1 and PSEC-2. PSEC-1 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function and a random function (hash function). PSEC-2 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function, two random funct...

متن کامل

Psec{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (submission to P1363a)

We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we dene a new prob...

متن کامل

A Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...

متن کامل

A Provably Secure Elliptic Curve Scheme with Fast Encryption

We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n, where n is an RSA modulus, and merges ideas from Paillier and Rabin related schemes. Despite the typical bit length of n, our encryption algorithm is faster than El Gamal elliptic curve cryptosystems. The one-wayness of the ne...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000