New Construction of PVPKE Scheme Based on Signed Quadratic Residues

Jindan Zhang, Xu An Wang
{"title":"New Construction of PVPKE Scheme Based on Signed Quadratic Residues","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/INCoS.2013.81","DOIUrl":null,"url":null,"abstract":"In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its \"gap\" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its "gap" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.
基于有符号二次残数的PVPKE方案的新构造
在SCN12中,Nieto等人[7]讨论了具有选择密文安全性的公钥加密的一个有趣性质,即具有公开可验证性的密文。另外,我们引入了一种新的加密原语:CCA Secure Public verifiable Public Key Encryption Without pairs In the Standard Model (PVPKE),并讨论了其在代理重加密(PRE)和阈值公钥加密(TPKE)中的应用[10]。在Crypto'09中,Hofheiz和Kiltz[6]引入了有符号二次残数群并讨论了它的应用,这个群最有趣的特征是它的“间隙”性质,而计算问题和因式分解一样难,对应的决策问题很容易。在本文中,我们证明了如果将Nieto等人的一些方案建立在有符号二次残基上,所得到的方案能够满足PVPKE的要求。在此基础上,给出了基于有符号二次残数的PVPKE方案的新构造,并分析了其安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信