中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 软件所图书馆  > 会议论文
Title:
selective opening chosen ciphertext security directly from the ddh assumption
Author: Liu Shengli ; Zhang Fangguo ; Chen Kefei
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Conference Name: 6th International Conference on Network and System Security, NSS 2012
Conference Date: November 21, 2012 - November 23, 2012
Issued Date: 2012
Conference Place: Wuyishan, Fujian, China
Keyword: Public key cryptography
Indexed Type: EI
ISSN: 0302-9743
ISBN: 9783642346002
Department: (1) Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China; (2) School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China; (3) State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China; (4) Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Abstract: Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get the random coins as well as the plaintexts used to generate ciphertexts. The attack is named "selective opening attack". We study how to achieve full-fledged chosen-ciphertext security in selective opening setting directly from the DDH assumption. Our construction is free of chameleon hashing, since tags are created for encryptions in a flexible way to serve the security proof. © 2012 Springer-Verlag.
English Abstract: Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get the random coins as well as the plaintexts used to generate ciphertexts. The attack is named "selective opening attack". We study how to achieve full-fledged chosen-ciphertext security in selective opening setting directly from the DDH assumption. Our construction is free of chameleon hashing, since tags are created for encryptions in a flexible way to serve the security proof. © 2012 Springer-Verlag.
Language: 英语
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/15849
Appears in Collections:软件所图书馆_会议论文

Files in This Item:

There are no files associated with this item.


Recommended Citation:
Liu Shengli,Zhang Fangguo,Chen Kefei. selective opening chosen ciphertext security directly from the ddh assumption[C]. 见:6th International Conference on Network and System Security, NSS 2012. Wuyishan, Fujian, China. November 21, 2012 - November 23, 2012.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Liu Shengli]'s Articles
[Zhang Fangguo]'s Articles
[Chen Kefei]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Liu Shengli]‘s Articles
[Zhang Fangguo]‘s Articles
[Chen Kefei]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace