Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting
スポンサーリンク
概要
- 論文の詳細を見る
In [1], Bellare, Boldyreva, and Micali addressed the security of public-key encryptions (PKEs) in a multi-user setting (called the BBM model in this paper). They showed that although the indistinguishability in the BBM model is induced from that in the conventional model, its reduction is far from tight in general, and this brings a serious key length problem. In this paper, we discuss PKE schemes in which the IND-CCA security in the BBM model can be obtained tightly from the IND-CCA security. We call such PKE schemes IND-CCA secure in the BBM model with invariant security reductions (briefly, SR-invariant IND-CCABBM secure). These schemes never suffer from the underlying key length problem in the BBM model. We present three instances of an SR-invariant IND-CCABBM secure PKE scheme: the first is based on the Fujisaki-Okamoto PKE scheme [7], the second is based on the Bellare-Rogaway PKE scheme [3], and the last is based on the Cramer-Shoup PKE scheme [5].
- (社)電子情報通信学会の論文
- 2011-02-01
著者
-
Komatsu Naohisa
Faculty Of Science And Engineering School Of Fundamental Science And Engineering Waseda University
-
Nishioka Mototsugu
Systems Lab. Hitachi Ltd.
-
Nishioka Mototsugu
Systems Lab Hitachi Ltd.
関連論文
- Identity-Based Encryptions with Tight Security Reductions to the BDH Problem
- Mean delay approximation for the mean waiting time in the GI/GI/1 queueing system (コミュニケーションクオリティ)
- A Note on the Random Oracle Methodology
- Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting
- Secure Public-Key Encryption from Random Oracle Transformation
- Mean Approximate Formulas for GI/G/1 Processor-Sharing System