A simpler construction of CCA2-secure public-key encryption under general assumptions

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

54 Scopus citations

Abstract

In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor-Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsEli Biham
PublisherSpringer Verlag
Pages241-254
Number of pages14
ISBN (Print)3540140395, 9783540140399
DOIs
StatePublished - 2003
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2656
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fingerprint

Dive into the research topics of 'A simpler construction of CCA2-secure public-key encryption under general assumptions'. Together they form a unique fingerprint.

Cite this