Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu
{"title":"DHIES的密钥依赖消息安全性研究","authors":"Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu","doi":"10.1109/ICAIT.2017.8388939","DOIUrl":null,"url":null,"abstract":"DHIES is a Diffle-Hellman based scheme that combines a symmetric encryption method, a message authentication code, and a hash function, in addition to number theoretic operations, in a way which is intended to provide security against chosen ciphertext attacks. In this paper, we show that DHIES satisfies KEM-CCA security. DHIES is a extension of Elgamal encryption scheme, which is as efficient as ElGamal encryption encryption. However, it has stronger security properties, Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. In this paper, we study the KDM-CCA security of DHIES, we prove that the DHIES can achieves KDM-CCA security if appropriate assumption on the underlying primitive.","PeriodicalId":376884,"journal":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On the key dependent message security of DHIES\",\"authors\":\"Honglong Dai, Luxuan Zhang, Janyan Ji, Jinyong Chang, Maozhi Xu\",\"doi\":\"10.1109/ICAIT.2017.8388939\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"DHIES is a Diffle-Hellman based scheme that combines a symmetric encryption method, a message authentication code, and a hash function, in addition to number theoretic operations, in a way which is intended to provide security against chosen ciphertext attacks. In this paper, we show that DHIES satisfies KEM-CCA security. DHIES is a extension of Elgamal encryption scheme, which is as efficient as ElGamal encryption encryption. However, it has stronger security properties, Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. In this paper, we study the KDM-CCA security of DHIES, we prove that the DHIES can achieves KDM-CCA security if appropriate assumption on the underlying primitive.\",\"PeriodicalId\":376884,\"journal\":{\"name\":\"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIT.2017.8388939\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIT.2017.8388939","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DHIES is a Diffle-Hellman based scheme that combines a symmetric encryption method, a message authentication code, and a hash function, in addition to number theoretic operations, in a way which is intended to provide security against chosen ciphertext attacks. In this paper, we show that DHIES satisfies KEM-CCA security. DHIES is a extension of Elgamal encryption scheme, which is as efficient as ElGamal encryption encryption. However, it has stronger security properties, Furthermore, these security properties are proven to hold under appropriate assumptions on the underlying primitive. In this paper, we study the KDM-CCA security of DHIES, we prove that the DHIES can achieves KDM-CCA security if appropriate assumption on the underlying primitive.