Back to Search
Start Over
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
- Source :
- Computer Journal; Oct2015, Vol. 58 Issue 10, p2738-2746, 9p
- Publication Year :
- 2015
-
Abstract
- In Cramer et al. (2007, Bounded CCA2-Secure Encryption. In Kurosawa, K. (ed.), Advances in Cryptology - ASIACRYPT 2007, Kuching, Malaysia, December 2-6, Lecture Notes in Computer Science, Vol. 4833, pp. 502-518. Springer, Berlin, Germany) proposed a public-key encryption scheme secure against adversaries with a bounded number of decryption queries based on the decisional Diffie-Hellman problem. In this paper, we show that the same result can be obtained based on weaker computational assumptions, namely: the computational Diffie-Hellman and the hashed Diffie-Hellman assumptions. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 00104620
- Volume :
- 58
- Issue :
- 10
- Database :
- Complementary Index
- Journal :
- Computer Journal
- Publication Type :
- Academic Journal
- Accession number :
- 110012464
- Full Text :
- https://doi.org/10.1093/comjnl/bxv040