{"title":"基于有符号二次残数的PVPKE方案的新构造","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/INCoS.2013.81","DOIUrl":null,"url":null,"abstract":"In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its \"gap\" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"New Construction of PVPKE Scheme Based on Signed Quadratic Residues\",\"authors\":\"Jindan Zhang, Xu An Wang\",\"doi\":\"10.1109/INCoS.2013.81\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its \\\"gap\\\" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.\",\"PeriodicalId\":353706,\"journal\":{\"name\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2013.81\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.81","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
在SCN12中,Nieto等人[7]讨论了具有选择密文安全性的公钥加密的一个有趣性质,即具有公开可验证性的密文。另外,我们引入了一种新的加密原语:CCA Secure Public verifiable Public Key Encryption Without pairs In the Standard Model (PVPKE),并讨论了其在代理重加密(PRE)和阈值公钥加密(TPKE)中的应用[10]。在Crypto'09中,Hofheiz和Kiltz[6]引入了有符号二次残数群并讨论了它的应用,这个群最有趣的特征是它的“间隙”性质,而计算问题和因式分解一样难,对应的决策问题很容易。在本文中,我们证明了如果将Nieto等人的一些方案建立在有符号二次残基上,所得到的方案能够满足PVPKE的要求。在此基础上,给出了基于有符号二次残数的PVPKE方案的新构造,并分析了其安全性。
New Construction of PVPKE Scheme Based on Signed Quadratic Residues
In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its "gap" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.