In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the.
In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA-secure in the ...
An efficient PKE scheme employing identity-based techniques that requires short public key and is proven CCA-secure in the standard model (without random ...
Abstract. Boneh, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure public key encryption (PKE) from any selective-ID CPA-secure ...
Nov 21, 2024 · In this paper, we propose an efficient PKE scheme employing identity-based techniques. Our scheme requires short public key and is proven CCA- ...
Overall, the most efficient CCA-secure encryption scheme cur- rently known is a hybrid encryption system due to Kurosawa and Desmedt [25] which builds on the ...
We propose a new CCA secure public key encryption (PKE) scheme over ideal lattices by universal paradigm of IBE transformation.
People also ask
What is CCA secure encryption?
What is identity-based public key cryptography?
Abstract. Security against chosen-ciphertext attacks (CCA) concerns privacy of messages even if the adversary has access to the decryption oracle.
In this paper, we present a practical CCA-secure PKE scheme under the CDH assumption such that the size of a ciphertext is much smaller than that of the scheme ...
Oct 22, 2024 · The second way to construct CCA-secure PKE is the paradigm of IBE transformation, which allows transforming selective-ID CPA-secure ...