Abstract | ||
---|---|---|
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure) public-key encryption scheme against adaptive chosen-ciphertext attacks (active adversaries) in the random oracle model. Since our conversion requires only one random (hash) function operation, the converted scheme is almost as efficient as the original one, when the random function is replaced by a practical hash function such as SHA-1 and MD5. We also give a concrete analysis of the reduction for proving its security, and show that our security reduction is (almost) optimally efficient. Finally this paper gives some practical examples of applying this conversion to some practical and semantically secure encryption schemes such as the ElGamal, Blum-Goldwasser and Okamoto-Uchiyama schemes[4, 7, 9]. |
Year | DOI | Venue |
---|---|---|
1999 | 10.1007/3-540-49162-7_5 | Public Key Cryptography |
Keywords | Field | DocType |
public-key encryption,practical hash function,okamoto-uchiyama scheme,minimum cost,practical example,function operation,semantically secure encryption scheme,converted scheme,random oracle model,efficient conversion,random function,public-key encryption scheme,public key,chosen ciphertext attack,public key encryption | Multiple encryption,Computer science,Deterministic encryption,Attribute-based encryption,Plaintext-aware encryption,Theoretical computer science,Encryption,40-bit encryption,Probabilistic encryption,56-bit encryption | Conference |
Volume | Issue | ISSN |
1560 | 1 | 0302-9743 |
ISBN | Citations | PageRank |
3-540-65644-8 | 143 | 7.23 |
References | Authors | |
6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Eiichiro Fujisaki | 1 | 1526 | 114.30 |
Tatsuaki Okamoto | 2 | 5408 | 521.96 |