Public Key Encryption without Random Oracle Made Truly Practical [chapter]

Puwen Wei, Xiaoyun Wang, Yuliang Zheng
2009 Lecture Notes in Computer Science  
An important research area in the past decade is to search for efficient cryptographic schemes that do not rely for their security on the controversial random oracle assumption. In this paper, we continue this line of endeavors and report our success in identifying a very efficient public key encryption scheme whose formal security proof does not require a random oracle. Specifically, we show how to modify a universal hash based public key encryption scheme proposed by Zheng and Seberry at
more » ... o'92, in such a way that the resultant scheme not only preserves efficiency but also admits provable security against adaptive chosen ciphertext attack without a random oracle. We also compare the modified Zheng-Seberry scheme with related encryption schemes in terms of efficiency and underlying assumptions, supporting our conclusion that the modified Zheng-Seberry scheme is preferable to its competitors.
doi:10.1007/978-3-642-11145-7_10 fatcat:idiu42ricbey7ezl23vxkw6lty