Filters








284 Hits in 5.5 sec

Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption [chapter]

Dan Boneh, Jonathan Katz
2005 Lecture Notes in Computer Science  
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption schemes from identity-based encryption schemes in the standard model.  ...  We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure  ...  methodology for constructing CCA-secure public-key cryptosystems from weak identity-based encryption schemes.  ... 
doi:10.1007/978-3-540-30574-3_8 fatcat:3tqhbkoegveh5cybcxwvr3twni

SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

Jun Shao, Zhenfu Cao, Peng Liu
2009 Security and Communication Networks  
We address these challenges by using CCA-secure (2, 2) threshold cryptosystem to obtain public verifiability, and the method of key management in identity-based encryption (IBE) to achieve collusion-resistance  ...  CCA security and collusion-resistance in proxy re-encryption § In Reference [20], we showed that none of existing IBPRE scheme is CCA-secure.  ...  However, the improvement of modular exponentiation computation cannot increase the computational efficiency of most of the existing CCA-secure schemes [17, 19] , since they are built on bilinear maps  ... 
doi:10.1002/sec.109 fatcat:u23x3lhy6rbt3hxa45slvzw7lm

Public key encryption supporting plaintext equality test and user-specified authorization

Qiang Tang
2012 Security and Communication Networks  
We provide a formal formulation for this primitive and present a construction with provable security in our security model.  ...  In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization.  ...  ACKNOWLEDGEMENT The author would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1002/sec.418 fatcat:4mbdx4qiina6rjlv37hk7kdqgm

A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks

Shrishty Gautam, Charu Wahi, Seema Sharma
2017 IJARCCE  
Thus, using IBE, encryption can be performed, without the recipients public key. In this paper, we survey the various Identity based encryption techniques that have been proposed till now.  ...  Identity Based Encryption (IBE) is an encryption technique that was developed, keeping in mind, the wireless sensor networks.  ...  Seema Sharma for providing me the opportunity to study and write this paper, and for guiding me throughout.  ... 
doi:10.17148/ijarcce.2017.6163 fatcat:nax4qzuo2nf3xlg3rdni3cocjm

Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment

Oleg Izmerly, Tal Mor
2006 Theoretical Computer Science  
Recently, Regev introduced a new (and much simpler) public key cryptosystem, based on the same u-SVP hardness assumption, but with improved parameters.  ...  We then discuss the possibility of making public key encryption (PKE) secure against CCA, without adding stronger assumptions than the assumption that u-SVP is hard.  ...  Acknowledgments We thank Oded Regev for comments and simplification of the proofs of Lemmas 3.1 and 4.1.  ... 
doi:10.1016/j.tcs.2006.07.060 fatcat:7fd2bjvqorgmhmacoiyjoxjqoy

Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

Xianfeng Guo, Jiashu Zhang, Muhammad Khurram Khan, Khaled Alghathbar
2011 Sensors  
To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed.  ...  Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys.  ...  [8] proposed a novel chaotic block cryptosystem based on [5, 9, 10] .  ... 
doi:10.3390/s110201607 pmid:22319371 pmcid:PMC3274046 fatcat:y4cxwtotxfcz3apmd6kkbdra2i

Lossy Trapdoor Functions and Their Applications

Chris Peikert, Brent Waters
2011 SIAM journal on computing (Print)  
Using NIZK proofs, CCA-secure cryptosystems have been constructed based on problems related to factoring and discrete logs [47, 23, 60, 19, 20] , but not lattices.  ...  Because they generically yield passively secure (i.e., chosen plaintext-secure) cryptosystems that are witness-recovering, it is tempting to think that they might also yield efficient CCA-secure encryption  ...  a simpler construction of the LWE-based ABO, and to the anonymous STOC'08 and SICOMP reviewers for many helpful comments on the presentation.  ... 
doi:10.1137/080733954 fatcat:aar54oj7angjfowcrtacu2hqye

Lossy trapdoor functions and their applications

Chris Peikert, Brent Waters
2008 Proceedings of the fourtieth annual ACM symposium on Theory of computing - STOC 08  
Using NIZK proofs, CCA-secure cryptosystems have been constructed based on problems related to factoring and discrete logs [47, 23, 60, 19, 20] , but not lattices.  ...  Because they generically yield passively secure (i.e., chosen plaintext-secure) cryptosystems that are witness-recovering, it is tempting to think that they might also yield efficient CCA-secure encryption  ...  a simpler construction of the LWE-based ABO, and to the anonymous STOC'08 and SICOMP reviewers for many helpful comments on the presentation.  ... 
doi:10.1145/1374376.1374406 dblp:conf/stoc/PeikertW08 fatcat:x5livcstg5ajtmltxzhgatovmy

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Liaojun Pang, Jie Yang, Zhengtao Jiang
2014 The Scientific World Journal  
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years.  ...  It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time.  ...  [7] introduced the idea of a more general key-policy attribute-based cryptosystem for fine-grained sharing of encrypted data and proved its security in the attribute-based selective-set model under  ... 
doi:10.1155/2014/193426 pmid:25101313 pmcid:PMC4101931 fatcat:gj2byf7xozaadhx4ppfcblgany

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter [chapter]

Ingo von Maurich, Lukas Heberle, Tim Güneysu
2016 Lecture Notes in Computer Science  
Common ways for the McEliece and Niederreiter encryption schemes to achieve IND-CPA/IND-CCA security are surrounding constructions that convert them into secured schemes.  ...  Their security is based on variants of hard problems in coding theory.  ...  The authors would like to thank Rafael Misoczki for helpful feedback and comments when starting this project.  ... 
doi:10.1007/978-3-319-29360-8_1 fatcat:ie3tcyndyndh5izf5l67dmldyy

Homomorphic Encryption — Theory and Application [chapter]

Jaydip Sen
2013 Theory and Practice of Cryptography and Network Security Protocols and Technologies  
It is an example of a cryptographic primitive that can be built using lattice models, but cannot be built using bilinear maps or other traditional algebraic methods based on factoring or discrete log type  ...  They have also shown how to construct a very efficient ring counterpart to Regev's public-key encryption scheme (Regev, 2005) , as well as a counterpart to the identity-based encryption scheme presented  ... 
doi:10.5772/56687 fatcat:amgaohpdbnal3ly6nsx4nvasmm

Homomorphic Encryption: Theory & Applications [article]

Jaydip Sen
2013 arXiv   pre-print
A significant number of propositions on fully homomorphic encryption is then discussed.  ...  The fundamental theories of homomorphic encryption are then discussed with suitable examples.  ...  It is an example of a cryptographic primitive that can be built using lattice models, but cannot be built using bilinear maps or other traditional algebraic methods based on factoring or discrete log type  ... 
arXiv:1305.5886v1 fatcat:agzyco4ehnfajiamrbp7qobo2a

An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme [article]

Rkia Aouinatou, Mostafa Belkasmi
2012 arXiv   pre-print
This is right as those schemes are secure (under this model), efficient and useful for some applications.  ...  We will study the security of our schemes, which is basing on an efficient strong Diffie-Hellman problem compared to BB1 and BB2.  ...  The encryption algorithm encrypts messages for an identity using params and the decryption algorithm decrypts ciphertexts using the private key.  ... 
arXiv:1208.1217v1 fatcat:zcrbuhi4sfgndbwc5yp5rnw25e

Security-Mediated Certificateless Cryptography [chapter]

Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
2006 Lecture Notes in Computer Science  
Our concrete scheme is more efficient than the identity-based mediated encryption scheme of Baek and Zheng in PKC 2004 which is provably secure in a comparable security model.  ...  Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms.  ...  He is grateful to his coauthors for offering this on-going project, and anonymous reviewers for helpful comments and the suggestion about generic construction in particular.  ... 
doi:10.1007/11745853_33 fatcat:m2t7rq2zyvdtbp3hjd6cfw4riu

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

2016 KSII Transactions on Internet and Information Systems  
Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.  ...  Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption  ...  The author also thanks the anonymous reviewers of the paper for their careful reviews and valuable comments  ... 
doi:10.3837/tiis.2016.08.022 fatcat:plj6fns2l5b6xilzr3kmr3sw4u
« Previous Showing results 1 — 15 out of 284 results