Abstract
Nowadays, indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) has been widely accepted as a proper security criterion for encryption schemes. In this paper, an efficient conversion is proposed to satisfy the IND-CCA2 security. It uses the random oracle methodology and the idea of hybrid encryption, and can enhance any Diffie-Hellman based encryption scheme, which is only one-way under plaintext-checking attack. Compared with other existing conversions, this conversion has the advantages of short ciphertext and low computation overhead, especially when it is applied to the multi-recipient setting.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Abe M, Gennaro R, Kurosawa K. Tag-KEM/DEM: A new framework for hybrid encryption[C]//Proceedings of EUROCRYPT’ 05. Berlin: Springer-Verlag, 2005: 128–146.
Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks [C]//Proceedings of STOC’90. New York: ACM Press, 1990: 427–437.
Dolev D, Dwork C, Naor M. Non-malleable cryptography [C]//Proceedings of STOC’91. New York: ACM Press, 1991: 542–552.
Rackoff C, Simon D. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]//Proceedings of CRYPTO’91. Berlin: Springer-Verlag, 1992: 433–444.
ElGamal T. A Public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Transactions on Information Theory, 1985, IT-31(4): 469–472.
Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack[C]// Proceedings of Crypto’98. Berlin: Springer-Verlag, 1998: 13–25.
Bellare M, Rogaway, P. Optimal asymmetric encryption—how to encrypt with RSA[C]//Proceedings of Eurocrypto’94. Berlin: Springer-Verlag, 1995: 92–111.
Coron J S, Handschuh H, Joye M, et al. GEM: A generic chosen-ciphertext secure encryption method[C]//Proceedings of CT-RSA’02. Berlin: Springer-Verlag, 2002: 263–276.
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes[C]// Proceedings of Crypto’99. Berlin: Springer-Verlag, 1999: 537–554.
Fujisaki E, Okamoto T. How to Enhance the security of public-key encryption at minimum cost[C]// Proceedings of PKC’99. Berlin: Springer-Verlag, 1999: 53–68.
Okamoto T, Pointcheval D. REACT: Rapid enhanced-security asymmetric cryptosystem transform[C]//Proceedings of CT-RSA’01. Berlin: Springer-Verlag, 2001: 159–175.
Pointcheval D. Chosen-ciphertext security for any one-way cryptosystem[C]//Proceedings of PKC’00. Berlin: Springer-Verlag, 2000: 129–146.
Phan D H, Pointcheval D. Chosen-ciphertext security without redundancy[C]//Proceedings of Asiacrypto’03. Berlin: Springer-Verlag, 2003: 1–18.
Phan D H, Pointcheval D. OAEP 3-Round: a generic and secure asymmetric encryption padding[C]// Proceedings of Asiacrypto’04 (LNCS 3329). Berlin: Springer-Verlag, 2004: 63–77.
Goldwasser S, Micali S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28: 270–299.
Kurosawa K, Matsuo T. How to remove MAC from DHIES [C]//Proceedings of ACISP’04. Berlin: Springer-Verlag, 2004: 236–247.
Bellare M, Boldyreva A, Staddon J. Multi-recipient encryption schemes: Security notions and randomness re-use[C]// Proceedings of PKC’03. Berlin: Springer-Verlag, 2003: 85–99.
Kurosawa K. Multi-recipient public-key encryption with shortened ciphertext[C]//Proceedings of PKC’02. Berlin: Springer-Verlag, 2002: 48–63.
Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Proceedings of CRYPTO’01, Berlin: Springer-Verlag, 2001: 213–229.
Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack [C]// Proceedings of CRYPTO’98. Berlin: Springer-Verlag, 1998: 13–25.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60903178)
Biography: ZHANG Xi, male, Associate professor, research direction: information security.
Rights and permissions
About this article
Cite this article
Zhang, X., Hang, H. An efficient conversion scheme for enhancing security of Diffie-Hellman-based encryption. Wuhan Univ. J. Nat. Sci. 15, 415–421 (2010). https://doi.org/10.1007/s11859-010-0676-9
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-010-0676-9
Key words
- Diffie-Hellman-based encryption
- adaptive chosenciphertext attack
- multi-recipient setting
- randomness-reusing