Reducing public key sizes in bounded CCA-secure KEMs with optimal ciphertext length

1Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Currently, chosen-ciphertext (CCA) security is considered as the de facto standard security notion for public key encryption (PKE), and a number of CCA-secure schemes have been proposed thus far. However, CCA-secure PKE schemes are generally less efficient than schemes with weaker security, e.g., chosen-plaintext security, due to their strong security. Surprisingly, Cramer et al. (Asiacrypt 2007) demonstrated that it is possible to construct a PKE scheme from the decisional Diffie- Hellman assumption that yields (i) bounded CCA (BCCA) security which is only slightly weaker than CCA security, and (ii) one group element of ciphertext overhead which is optimal. In this paper, we propose two novel BCCA-secure PKE schemes with optimal ciphertext length that are based on computational assumptions rather than decisional assumptions and that yield shorter (or at least comparable) public key sizes. Our first scheme is based on the computational bilinear Diffie-Hellman assumption and yields O(λq) group elements of public key length, and our second scheme is based on the factoring assumption and yields O(λq2) group elements of public key length, while in Cramer et al.’s scheme, a public key consists of O(λq2) group elements, where λ is the security parameter and q is the number of decryption queries. Moreover, our second scheme is the first PKE scheme which is BCCA-secure under the factoring assumption and yields optimal ciphertext overhead.

Cite

CITATION STYLE

APA

Yamakawa, T., Yamada, S., Matsuda, T., Hanaoka, G., & Kunihiro, N. (2015). Reducing public key sizes in bounded CCA-secure KEMs with optimal ciphertext length. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7807, pp. 100–109). Springer Verlag. https://doi.org/10.1007/978-3-319-27659-5_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free