Tag-KEM from Set Partial Domain One-Way Permutations
スポンサーリンク
概要
- 論文の詳細を見る
Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabins encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.
- (社)電子情報通信学会の論文
- 2009-01-01
著者
-
IMAI Hideki
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science a
-
KUROSAWA Kaoru
Ibaraki University
-
CUI Yang
Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science &
-
ABE Masayuki
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Abe Masayuki
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Cui Yang
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Kurosawa Kaoru
Ibaraki Univ. Hitachi‐shi Jpn
-
Abe Masayuki
Ntt Information Sharing Platform Laboratories
-
Imai Hideki
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
関連論文
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Unconditionally Secure Chaffing-and-Winnowing
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)