Psec{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (submission to P1363a)

نویسندگان

  • David Pointcheval
  • David. Pointcheval
چکیده

We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we dene a new problem, the Elliptic Curve Gap Die-Hellman problem (EC|Gap{ DH) which is likely stronger than the more classical Elliptic Curve Decision Die-Hellman (EC{DDH) problem. Indeed, its tractability would imply the equivalence between the Computational and the Decisional versions of the Elliptic Curve Die-Hellman problem. PSEC{3 therefore has several outstanding properties as follows: 1. with the one-time pad, PSEC{3 is semantically secure or non-malleable against chosen-ciphertext attacks (IND-CCA2 or NM-CCA2), in the random oracle model, under the Elliptic Curve Gap Die-Hellman (EC{Gap-DH) assumption. 2. with any symmetric encryption, PSEC{3 is semantically secure or non-malleable against chosen-ciphertext attacks (IND-CCA2 or NM-CCA2), in the random oracle model, under the Elliptic Curve Gap Die-Hellman (EC{Gap-DH) assumption, if the underlying symmetric encryption is simply semantically secure against passive attacks. 3. if the underlying random functions are replaced by practical random-like functions (e.g., SHA and MD5), PSEC{3 is as ecient as the basic Elliptic Curve El Gamal scheme, for the encryption process but also for the decryption process, which is the major novelty of this new proposal. The encryption scheme described in this contribution is obtained by using a new result on conversion techniques using random functions by the authors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PSEC: Provably Secure Elliptic Curve Encryption Scheme (Submission to P1363a)

We describe an elliptic curve encryption scheme, PSEC (provably secure elliptic curve encryption scheme), which has two versions: PSEC-1 and PSEC-2. PSEC-1 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function and a random function (hash function). PSEC-2 is a public-key encryption system that uses the elliptic curve ElGamal trapdoor function, two random funct...

متن کامل

PSEC { 3 : Provably Secure Elliptic Curve Encryption Scheme { V 3 (

We describe a new version of the elliptic curve encryption schemes PSEC (Provably Secure Elliptic Curve). PSEC{3 is a public-key encryption system that uses the elliptic curve El Gamal trapdoor function and two random functions (hash functions) as well as any semantically secure symmetric encryption scheme, such as the one-time pad, or any classical block-cipher. Furthermore, we de ne a new pro...

متن کامل

Practical Identification Schemes as Secure as the DL and RSA problems (Submission to P1363a)

We present a practical three-move interactive identification scheme, ID-DL, and prove it to be as secure as the discrete logarithm problem. ID-DL is almost as efficient as the Schnorr identification scheme, which is not provably secure. We also present another practical identification scheme, ID-RSA, which is proven to be as secure as the RSA problem and almost as efficient as the Guillou-Quisq...

متن کامل

A Comparative Analysis of Hybrid Encryption Schemes Based on Elliptic Curves

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures, and performing key exchanges. Regarding the encryption capability, the first schemes that appeared were either versions of already existing public-key algorithms (Massey-Omura and ElGamal) or new schemes specified ad hoc (MenezesVanstone). However, all the initial elliptic curve encryption ...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000