上海交通大学学报(英文版) ›› 2014, Vol. 19 ›› Issue (4): 412-417.doi: 10.1007/s12204-014-1517-3
XU Yi-dong* (许一栋), LIU Sheng-li (刘胜利)
出版日期:
2014-08-30
发布日期:
2014-10-13
通讯作者:
XU Yi-dong (许一栋
E-mail: xuyidong123@126.com
XU Yi-dong* (许一栋), LIU Sheng-li (刘胜利)
Online:
2014-08-30
Published:
2014-10-13
Contact:
XU Yi-dong (许一栋
E-mail: xuyidong123@126.com
摘要: Chameleon all-but-one trapdoor functions (ABO-TDFs) were introduced by Lai et al. An important component of the existing constructions of chameleon ABO-TDFs based on the decisional Diffie-Hellman (DDH) assumption was the chameleon hash functions. In this paper, we instantiate the first chameleon ABO-TDFs based on DDH free of chameleon hash functions.
中图分类号:
XU Yi-dong* (许一栋), LIU Sheng-li (刘胜利). One Construction of Chameleon All-But-One Trapdoor Functions[J]. 上海交通大学学报(英文版), 2014, 19(4): 412-417.
XU Yi-dong* (许一栋), LIU Sheng-li (刘胜利). One Construction of Chameleon All-But-One Trapdoor Functions[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 412-417.
[1] Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks[C]//Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing. New York, USA:ACM, 1990: 427-437. [2] Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126. [3] Peikert C, Waters B. Lossy trapdoor functions and their applications [J]. SIAM Journal on Computing,2011, 40(6): 1803-1844. [4] H°astad J, Impagliazzo R, Levin L A, et al. A pseudorandom generator from any one-way function [J].SIAM Journal on Computing, 1999, 28(4): 1364-1396. [5] Naor M, Yung M. Universal one-way hash functions and their cryptographic applications [C]//Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing. New York, USA: ACM, 1989: 33-43. [6] Bellare M, Kiltz E, Peikert C, et al. Identitybased (lossy) trapdoor functions and applications [M].Berlin: Springer, 2012: 228-245. [7] Boldyreva A, Fehr S, O’Neill A. On notions of security for deterministic encryption, and efficient constructions without random oracles [M]. Berlin:Springer, 2008: 335-359. [8] Bellare M, Hofheinz D, Yilek S. Possibility and impossibility results for encryption and commitment secure under selective opening [M]. Berlin: Springer,2009: 1-35. [9] Freeman D M, Goldreich O, Kiltz E, et al. More constructions of lossy and correlation-secure trapdoor functions [J]. Journal of Cryptology, 2013, 26(1): 39-74. [10] Lai J, Deng R H, Liu S. Chameleon all-but-one TDFs and their application to chosen-ciphertext security[M]. Berlin: Springer, 2011: 228-245. [11] Hemenway B, Ostrovsky R. Lossy trapdoor functions from smooth homomorphic hash proof systems [C]//Electronic Colloquium on Computational Complexity(ECCC). Trier, Germany: ECCC, 2009: 127-127. [12] Hemenway B, Ostrovsky R. On homomorphic encryption and chosen-ciphertext security [M]. Berlin:Springer, 2012: 52-65. [13] Kiltz E, O’Neill A, Smith A. Instantiability of RSA-OAEP under chosen-plaintext attack [M]. Berlin:Springer, 2010: 295-313. [14] Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication [C]//Advances in Cryptology—EUROCRYPT’99. Berlin: Springer, 1999: 402-414. [15] Rosen A, Segev G. Chosen-ciphertext security via correlated products [J]. SIAM Journal on Computing,2010, 39(7): 3058-3088. [16] Mol P, Yilek S. Chosen-ciphertext security from slightly lossy trapdoor functions [M]. Berlin: Springer,2010: 296-311. [17] Damg°ard I, Jurik M. A generalisation, a simplification and some applications of paillier’s probabilistic public-key system [C]//Public Key Cryptography.Berlin: Springer, 2001: 119-136. [18] Liu S, Lai J, Deng R H. General construction of chameleon all-but-one trapdoor functions [M]. Berlin:Springer, 2011: 257-265. [19] Krawczyk H, Rabin T. Chameleon hashing and signatures [C]//Proceedings of the Network and Distributed System Security Symposium. Reston, Virginia,USA: The Internet Society, 2000: 143-154. [20] Boneh D. The decision diffie-hellman problem [M].Berlin: Springer, 1998: 48-63. [21] Boneh D, Halevi S, Hamburg M, et al. Circularsecure encryption from decision diffie-hellman [M].Berlin: Springer, 2008: 108-125. |
[1] | THAMANAM Srinivasa Rao, NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K. A Novel Image Encryption Technique Based on Inter Block Difference[J]. J Shanghai Jiaotong Univ Sci, 2021, 26(4): 488-493. |
[2] | LONG Yu1* (龙宇), CHEN Ke-fei2 (陈克非), MAO Xian-ping1 (毛贤平). New Constructions of Dynamic Threshold Cryptosystem[J]. 上海交通大学学报(英文版), 2014, 19(4): 431-435. |
[3] | ZHANG Wen-ying1,2 (张文英), LIU Feng1* (刘枫), LIU Xuan1 (刘宣), MENG Shuai1 (孟帅). Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32[J]. 上海交通大学学报(英文版), 2013, 18(2): 147-152. |
[4] | HE Guo-feng 1(何国锋), LI Xiang-xue 2(李祥学), LI Qiang 3(李 强), ZHENG Dong. Efficient Democratic Group Signatures with Threshold Traceability[J]. 上海交通大学学报(英文版), 2011, 16(5): 530-532. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 246
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 697
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||