The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
본 논문에서는 전산 Diffie-Hellman(CDH) 및 이중선형 전산 Diffie-Hellman(BCDH) 가정으로부터 두 가지 새로운 선택 암호문(CCA) 보안 방식을 제안합니다. CDH 가정의 첫 번째 체계는 Cash-Kiltz-Shoup 체계를 확장하여 구성되었습니다. 이 방식은 Hanaoka-Kurosawa 방식(따라서 Cramer-Shoup 방식)과 동일한 암호문을 생성하며 암호화 비용은 더 저렴합니다. 그러나 키 크기는 여전히 Hanaoka-Kurosawa 방식과 동일합니다. BCDH 가정의 두 번째 계획은 Boyen-Mei-Waters 계획을 확장하여 구성되었습니다. 이 체계에는 CDH 가정보다 더 강력한 기본 가정이 필요하지만 공개 키와 비밀 키 모두에 대해 키 크기가 상당히 짧아집니다. 또한 두 번째 체계의 암호문 길이는 원래 Boyen-Mei-Waters 체계의 암호문 길이와 동일합니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Shota YAMADA, Yutaka KAWAI, Goichiro HANAOKA, Noboru KUNIHIRO, "Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 11, pp. 1984-1993, November 2010, doi: 10.1587/transfun.E93.A.1984.
Abstract: In this paper, we propose two new chosen-ciphertext (CCA) secure schemes from the computational Diffie-Hellman (CDH) and bilinear computational Diffie-Hellman (BCDH) assumptions. Our first scheme from the CDH assumption is constructed by extending Cash-Kiltz-Shoup scheme. This scheme yields the same ciphertext as that of Hanaoka-Kurosawa scheme (and thus Cramer-Shoup scheme) with cheaper computational cost for encryption. However, key size is still the same as that of Hanaoka-Kurosawa scheme. Our second scheme from the BCDH assumption is constructed by extending Boyen-Mei-Waters scheme. Though this scheme requires a stronger underlying assumption than the CDH assumption, it yields significantly shorter key size for both public and secret keys. Furthermore, ciphertext length of our second scheme is the same as that of the original Boyen-Mei-Waters scheme.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.1984/_p
부
@ARTICLE{e93-a_11_1984,
author={Shota YAMADA, Yutaka KAWAI, Goichiro HANAOKA, Noboru KUNIHIRO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency},
year={2010},
volume={E93-A},
number={11},
pages={1984-1993},
abstract={In this paper, we propose two new chosen-ciphertext (CCA) secure schemes from the computational Diffie-Hellman (CDH) and bilinear computational Diffie-Hellman (BCDH) assumptions. Our first scheme from the CDH assumption is constructed by extending Cash-Kiltz-Shoup scheme. This scheme yields the same ciphertext as that of Hanaoka-Kurosawa scheme (and thus Cramer-Shoup scheme) with cheaper computational cost for encryption. However, key size is still the same as that of Hanaoka-Kurosawa scheme. Our second scheme from the BCDH assumption is constructed by extending Boyen-Mei-Waters scheme. Though this scheme requires a stronger underlying assumption than the CDH assumption, it yields significantly shorter key size for both public and secret keys. Furthermore, ciphertext length of our second scheme is the same as that of the original Boyen-Mei-Waters scheme.},
keywords={},
doi={10.1587/transfun.E93.A.1984},
ISSN={1745-1337},
month={November},}
부
TY - JOUR
TI - Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1984
EP - 1993
AU - Shota YAMADA
AU - Yutaka KAWAI
AU - Goichiro HANAOKA
AU - Noboru KUNIHIRO
PY - 2010
DO - 10.1587/transfun.E93.A.1984
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 11
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - November 2010
AB - In this paper, we propose two new chosen-ciphertext (CCA) secure schemes from the computational Diffie-Hellman (CDH) and bilinear computational Diffie-Hellman (BCDH) assumptions. Our first scheme from the CDH assumption is constructed by extending Cash-Kiltz-Shoup scheme. This scheme yields the same ciphertext as that of Hanaoka-Kurosawa scheme (and thus Cramer-Shoup scheme) with cheaper computational cost for encryption. However, key size is still the same as that of Hanaoka-Kurosawa scheme. Our second scheme from the BCDH assumption is constructed by extending Boyen-Mei-Waters scheme. Though this scheme requires a stronger underlying assumption than the CDH assumption, it yields significantly shorter key size for both public and secret keys. Furthermore, ciphertext length of our second scheme is the same as that of the original Boyen-Mei-Waters scheme.
ER -