{"title":"Stateful public key encryption: How to remove gap assumptions and maintaining tight reductions","authors":"Peng Yang, Rui Zhang, Kanta Matsuura","doi":"10.1109/ISITA.2008.4895436","DOIUrl":null,"url":null,"abstract":"Stateful public key encryption schemes are introduced recently with improved efficiency over traditional stateless schemes. However, previous proposals are either based on strong assumptions; or admitting very loose security reductions. In this paper, we improve these aspects by presenting a stateful public key encryption scheme with tight security reduction to the computational Diffie-Hellman assumption (cf. gap Diffie-Hellman in [5]), as well as a stateful identity based encryption scheme with tighter security reduction (than [12]) to the computational bilinear Diffie-Hellman problem. It is worth reminding that it is always desirable to have the proofs with tight reductions such that the actual schemes can be practically-meaningful.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Information Theory and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITA.2008.4895436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Stateful public key encryption schemes are introduced recently with improved efficiency over traditional stateless schemes. However, previous proposals are either based on strong assumptions; or admitting very loose security reductions. In this paper, we improve these aspects by presenting a stateful public key encryption scheme with tight security reduction to the computational Diffie-Hellman assumption (cf. gap Diffie-Hellman in [5]), as well as a stateful identity based encryption scheme with tighter security reduction (than [12]) to the computational bilinear Diffie-Hellman problem. It is worth reminding that it is always desirable to have the proofs with tight reductions such that the actual schemes can be practically-meaningful.