A Remark on GEM
スポンサーリンク
概要
- 論文の詳細を見る
We study the necessary assumptions for a class of asymmetric encryption schemes acquired by applying GEM (Generic Chosen-Ciphertext Secure Encryption Method). The original security proof of GEM was given by showing a reduction of the security of the resulting encryption scheme to the semantic security of the underlying secret key encryption schemes and the hardness of gap problems in certain groups on which the underlying public key encryption scheme relies. This actually shows a sufficient condition which supports the security of encryption scheme obtained in this way. In this work we show the assumption on hardness of gap problems is not only sufficient but also necessary. We show that if the underlying public key encryption scheme is not OW-PCA (Onewayness against Plaintext Checking Attack) secure, then the semantic security of the scheme will be defeated by an adaptive chosen ciphertext attack.
- 社団法人電子情報通信学会の論文
- 2005-05-20
著者
-
IMAI Hideki
Chuo University
-
Imai H
National Inst. Of Advanced Industrial Sci. And Technol. Tokyo Jpn
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
IMAI Hideki
Institute of Industrial Science, The University of Tokyo
-
HANAOKA Goichiro
Institute of Industrial Science, The University of Tokyo
-
ZHANG Rui
Institute of Industrial Science, University of Tokyo
-
Hanaoka Goichiro
Research Center For Information Security (rcis) National Institute Of Advanced Industrial Science &a
-
Hanaoka Goichiro
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka Goichiro
3rd Department Institute Of Industrial Science The University Of Tokyo
-
Zhang Rui
National Institute Of Advanced Industrial Science And Technology (aist)
-
Zhang R
Univ. Tokushima School Of Medicine Tokushima Jpn
-
Imai Hideki
Institute Of Industrial Science The University Of Tokyo
-
Hanaoka G
National Institute Of Advanced Industrial Science And Technology
-
Zhang R
Yale Univ. Ct Usa
-
Imai Hideki
Institute Of Industrial Science Interfaculty Initiative For Information Studies University Of Tokyo
-
Zhang Rui
Institute Of Industrial Science University Of Tokyo
-
Hanaoka Goichiro
Institute of Industrial, University of Tokyo
-
Imai Hideki
Institute of Industrial, University of Tokyo
関連論文
- Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings (Special Section on Information Theory and Its Applications)
- Unconditionally Secure Chaffing-and-Winnowing
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Shared Pseudo-Random Secret Generation Protocols (Special Section on Discrete Mathematics and Its Applications)
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
- Anonymous Password-Authenticated Key Exchange : New Construction and Its Extensions
- A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
- A New Security Architecture for Personal Networks and Its Performance Evaluation
- RSA-Based Password-Authenticated Key Exchange, Revisited
- A Secure Authenticated Key Exchange Protocol for Credential Services
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction(Information Security)
- New Security Architecture for Mobile IPv6 Networks
- Notes on Formal Methods Used for Verification of the Security Properties of Protocols Used in Wireless Environment
- A Leakage-Resilient Network Storage System
- Security Analysis of Password-based Protocols via FDR and AVISPA
- A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications(Information Security)
- An Efficient Leakage-Resilient Authenticated Key Exchange Protocol
- A Secure and Lightweight Authenticated Key Exchange Protocol for Wireless Networks
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Towards Removing Random Oracles from OAEP
- Invisibly Sanitizable Digital Signature Scheme
- Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions(Special Section on Cryptography and Information Security)
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- A New Anonymous Routing Scheme and its Aptitude for Ad-hoc Networks
- Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext
- Optimally Mastering Keys in Various Broadcast Encryption Schemes
- Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation(Cryptography and Information Security)(Information Theory and Its Applications)
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On Evaluating the Entropy of Graphical Passwords
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability(Special Section on Cryptography and Information Security)
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique (Special Issue on Spread Spectrum Techniques and Applications)
- Unconditionally Secure Authenticated Encryption(Discrete Mathematics and Its Applications)
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures
- On the oblivious transfer capacity of the erasure channel
- MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
- An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images (Special Section on Information Theory and Its Applications)
- Variable Error Controlling Schemes for Intelligent Error Controlling Systems (Special Section on Information Theory and Its Applications)
- A Provably Secure Refreshable Partially Anonymous Token and Its Applications(Discrete Mathematics and Its Applications)
- An Efficient Anonymous Authentication Scheme with No Unlinkability
- Traceability Schemes against Illegal Distribution of Signed Documents(Discrete Mathematics and Its Applications)
- Efficient Reliability-Based Turbo Decoding
- The Role of Arbiters for Unconditionally Secure Authentication(Discrete Mathematics and Its Applications)
- Purification and Primary Structure of C-1027-AG, a Selective Antagonist of Antitumor Antibiotic C-1027, from Streptomyces globisporus(Biological Chemistry)
- New Short Signature Scheme without Random Oracles
- Relation between the XL Algorithm and Grobner Basis Algorithms(Symmetric Key Cryptography, Cryptography and Information Security)
- An Efficient Group Signature Scheme from Bilinear Maps(Discrete Mathematics and Its Applications)
- Effect of Noisy Estimation on Turbo-Coded Modulation over Rayleigh Fading Channel
- Efficient Provider Authentication for Bidirectional Broadcasting Service
- A Trade-off Traitor Tracing Scheme
- Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
- Information-Theoretically Secure Key Insulated Encryption : Models, Bounds and Constructions(Cryptography and Information Security)(Information Theory and Its Applications)
- Integrated Co-channel Interference Cancellation and Decoding Scheme over Fading Multipath Channel for CDMA
- Quantum Bit Commitment Robust against Noise and Multiple-photons
- A Simple Method to Control Indirect Information Flows (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
- An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
- Sequential Bitwise Sanitizable Signature Schemes
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
- Improvements On Security Proofs of Some Identity Based Encryption Schemes
- Multilevel RLL (D, K, I) Constrained Sequences (Special Section on Information Theory and Its Applications)
- Secure Architecture For Distributed Intrusion Detection Systems
- Secure Broadcast System with Simultaneous Individual Messaging
- A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing(Information Security)
- LDPC coded Hybrid Type II ARQ System
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
- Relations among Notions of Security for Identity Based Encryption Schemes
- Relations among Notions of Security for Identity Based Encryption Schemes