Deterministic encryption: Definitional equivalences and constructions without random oracles

134Citations
Citations of this article
70Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs based on general assumptions. Specifically we consider seven notions of privacy for deterministic encryption, including six forms of semantic security and an indistinguishability notion, and show them all equivalent. We then present a deterministic scheme for the secure encryption of uniformly and independently distributed messages based solely on the existence of trapdoor one-way permutations. We show a generalization of the construction that allows secure deterministic encryption of independent high-entropy messages. Finally we show relations between deterministic and standard (randomized) encryption. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bellare, M., Fischlin, M., O’Neill, A., & Ristenpart, T. (2008). Deterministic encryption: Definitional equivalences and constructions without random oracles. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5157 LNCS, pp. 360–378). https://doi.org/10.1007/978-3-540-85174-5_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free