{"title":"4-wise独立哈希函数的防泄漏CCA2公钥加密","authors":"M. H. Nguyen, Kenji Yasunaga, Keisuke Tanaka","doi":"10.1109/ATC.2011.6027425","DOIUrl":null,"url":null,"abstract":"We consider the problem of constructing public-key encryption schemes that are resilient to chosen-ciphertext and key-leakage attach. In this paper, we present a generic construction of public-key encryption that is resilient to this attack from any 1-universal hash proof system and any 4-wise independent hash function. As shown in the paper [6] they can be instantiated with efficient schemes based on standard intractability assumptions such as Decisional Diffie-Hellman, Quadratic Residuosity, and Pailliers Decisional Composite Residuosity.","PeriodicalId":221905,"journal":{"name":"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions\",\"authors\":\"M. H. Nguyen, Kenji Yasunaga, Keisuke Tanaka\",\"doi\":\"10.1109/ATC.2011.6027425\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the problem of constructing public-key encryption schemes that are resilient to chosen-ciphertext and key-leakage attach. In this paper, we present a generic construction of public-key encryption that is resilient to this attack from any 1-universal hash proof system and any 4-wise independent hash function. As shown in the paper [6] they can be instantiated with efficient schemes based on standard intractability assumptions such as Decisional Diffie-Hellman, Quadratic Residuosity, and Pailliers Decisional Composite Residuosity.\",\"PeriodicalId\":221905,\"journal\":{\"name\":\"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATC.2011.6027425\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATC.2011.6027425","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions
We consider the problem of constructing public-key encryption schemes that are resilient to chosen-ciphertext and key-leakage attach. In this paper, we present a generic construction of public-key encryption that is resilient to this attack from any 1-universal hash proof system and any 4-wise independent hash function. As shown in the paper [6] they can be instantiated with efficient schemes based on standard intractability assumptions such as Decisional Diffie-Hellman, Quadratic Residuosity, and Pailliers Decisional Composite Residuosity.