New technique for chosen-ciphertext security based on non-interactive zero-knowledge
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Minhye | - |
dc.contributor.author | Abdalla, Michel | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.date.accessioned | 2021-09-01T12:30:46Z | - |
dc.date.available | 2021-09-01T12:30:46Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019-07 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/64219 | - |
dc.description.abstract | In this study, we propose a new method for conversion from a one-way (OW)-secure key encapsulation mechanism (KEM) into a chosen-ciphertext (CCA) secure KEM in the random oracle model. Our conversion method is based on the non-interactive zero-knowledge (NIZK) proof system for proving the relationships (e.g., equality or linearity) of discrete logarithms, where the security analysis of our conversion method depends on the NIZK properties of soundness and zero-knowledge. Our conversion method achieves tight security reduction and it is semi-generic in the sense that other than OW-security, a KEM should be NIZK-compatible. From a theoretical viewpoint, our conversion method can be considered as the corresponding approach for obtaining an efficient signature by applying the Fiat-Shamir transform to the NIZK system. We applied our conversion method to several OW-secure (identity-based) KEMs and compared the results with those obtained by previous methods for achieving CCA security. (C) 2019 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | PUBLIC-KEY ENCRYPTION | - |
dc.subject | SCHEMES | - |
dc.title | New technique for chosen-ciphertext security based on non-interactive zero-knowledge | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.ins.2019.03.063 | - |
dc.identifier.scopusid | 2-s2.0-85063521284 | - |
dc.identifier.wosid | 000468011900002 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.490, pp.18 - 35 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 490 | - |
dc.citation.startPage | 18 | - |
dc.citation.endPage | 35 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordPlus | IDENTITY-BASED ENCRYPTION | - |
dc.subject.keywordPlus | PUBLIC-KEY ENCRYPTION | - |
dc.subject.keywordPlus | SCHEMES | - |
dc.subject.keywordAuthor | Chosen-ciphertext security | - |
dc.subject.keywordAuthor | NIZK | - |
dc.subject.keywordAuthor | Random oracle model | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.