ElGamal and Cramer - Shoup Variants with Anonymity Using Different Groups ( Extended
نویسندگان
چکیده
In this paper, we have proposed new variants of the El-Gamal and the Cramer-Shoup encryption schemes. In our schemes, the anonymity property holds even if each user chooses an arbitrary prime q where |q| = k and p = 2q + 1 is also prime. More precisely, our El-Gamal variants provide anonymity against the chosen-plaintext attack, and our Cramer-Shoup variants provide anonymity against the adaptive chosen-ciphertext attack. These anonymity properties are proved under a slightly weaker assumption than the DDH assumption. Furthermore, our El-Gamal variants are secure in the sense of IND-CPA, and our Cramer-Shoup variants are secure in the sense of IND-CCA2.
منابع مشابه
Research Reports on Mathematical and Computing Sciences Department of Mathematical and Computing Sciences
We first propose the notion of universal anonymizable public-key encryption. Suppose that we have the encrypted data made with the same security parameter, and that these data do not satisfy the anonymity property. Consider the situation that we would like to transform these encrypted data to those with the anonymity property without decrypting these encrypted data. In this paper, in order to f...
متن کاملDesign and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite practical, and are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions. These appear to be the first publickey encryption schemes in the literature that are simultaneously practical and provably secure. This paper is a sig...
متن کاملUniversally Anonymizable Public-Key Encryption
We first propose the notion of universally anonymizable publickey encryption. Suppose that we have the encrypted data made with the same security parameter, and that these data do not satisfy the anonymity property. Consider the situation that we would like to transform these encrypted data to those with the anonymity property without decrypting these encrypted data. In this paper, in order to ...
متن کاملAn instantiation of the Cramer-Shoup encryption paradigm using bilinear map groups
A new instantiation of the Cramer-Shoup paradigm for secure encryption is presented, which is built using bilinear map groups. The security is based on the Bilinear Decisional Diffie-Hellman assumption. The recent efficiency improvements introduced in [KD04,GS04] are also applied to our constructions. One of the schemes thereby obtained presents efficiency similar to the most efficient encrypti...
متن کاملA Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants
We describe a CCA-secure public-key encryption scheme, in the Cramer-Shoup paradigm, based on the Linear assumption of Boneh, Boyen, and Shacham. Through a comparison to the Kiltz tag-encryption scheme from TCC 2006, our scheme gives evidence that the CramerShoup paradigm yields CCA encryption with shorter ciphertexts than the Canetti-Halevi-Katz paradigm. We present a generalization of the Lin...
متن کامل