TY - JOUR
T1 - Public-key encryption schemes with bounded CCA security and optimal ciphertext length based on the CDH and HDH assumptions
AU - Pereira, Mayana
AU - Dowsley, Rafael
AU - Nascimento, Anderson C.A.
AU - Hanaoka, Goichiro
PY - 2015/10
Y1 - 2015/10
N2 - In Cramer et al. (2007, Bounded CCA2-Secure Encryption. In Kurosawa, K. (ed.), Advances in Cryptology - ASIACRYPT 2007, Kuching, Malaysia, December 2-6, Lecture Notes in Computer Science, Vol. 4833, pp. 502-518. Springer, Berlin, Germany) proposed a public-key encryption scheme secure against adversaries with a bounded number of decryption queries based on the decisional Diffie-Hellman problem. In this paper, we show that the same result can be obtained based on weaker computational assumptions, namely: the computational Diffie-Hellman and the hashed Diffie-Hellman assumptions.
AB - In Cramer et al. (2007, Bounded CCA2-Secure Encryption. In Kurosawa, K. (ed.), Advances in Cryptology - ASIACRYPT 2007, Kuching, Malaysia, December 2-6, Lecture Notes in Computer Science, Vol. 4833, pp. 502-518. Springer, Berlin, Germany) proposed a public-key encryption scheme secure against adversaries with a bounded number of decryption queries based on the decisional Diffie-Hellman problem. In this paper, we show that the same result can be obtained based on weaker computational assumptions, namely: the computational Diffie-Hellman and the hashed Diffie-Hellman assumptions.
KW - bounded chosen ciphertext security
KW - computational Diffie-Hellman
KW - public-key encryption
UR - http://www.scopus.com/inward/record.url?scp=84943423211&partnerID=8YFLogxK
U2 - 10.1093/comjnl/bxv040
DO - 10.1093/comjnl/bxv040
M3 - Article
SN - 0010-4620
VL - 58
SP - 2738
EP - 2746
JO - The Computer Journal
JF - The Computer Journal
IS - 10
ER -