A Variant of the Schmidt-Takagi Encryption Scheme

نویسندگان

  • Takato Hirano
  • Koichiro Wada
  • Keisuke Tanaka
چکیده

Schmidt and Takagi proposed a variant of the Paillier encryption scheme which employs modulus n = pq [16]. Their scheme has a good property that the one-wayness is under the factoring assumption, and has an additively homomorphic property. Their scheme can be applied to trapdoor commitment and on-line/off-line signature. In this paper, we propose a new variant of the Schmidt-Takagi encryption scheme described as Et(r,m) = r s (1 + mn) mod n, where n, s, t are the public key, m a message, and r a random number. Our scheme has the one-wayness under the chosen plaintext attack based on the factoring problem, and the indistinguishability under the chosen plaintext attack based on the desicional composite residuosity problem. Our scheme implies the Schmidt-Takagi encryption scheme when s = t = 1. Compared with the Damg̊ard-Jurik encryption scheme, although the modulus of our schemes employs n = pq (their scheme employs n = pq), the encryption and decryption speed of our scheme is faster than that of their scheme. Furthermore, we get that Et is additively homomorphic in m if t ≥ ⌈(s+1)/2⌉. In addition, by adding a parameter t we have some properties closely related to homomorphic, which can be applied to cryptographic applications [9].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR

A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...

متن کامل

One-Wayness/KEM Equivalent to General Factoring

This paper shows the first practical semantically secure public-key encryption scheme such that its one-wayness is equivalent to general factoring in the standard model (in the sense of IND-CPA). Next our proof technique is applied to Rabin-Parlier encryption scheme and a variant of RSA-Paillier encryption scheme to prove their exactly tight one-wayness. We finally present the first KEM which i...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008