A simpler construction of CCA2-secure public-key encryption under general assumptions

Research output: Contribution to journalArticlepeer-review

35 Scopus citations

Abstract

In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor - Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.

Original languageEnglish
Pages (from-to)359-377
Number of pages19
JournalJournal of Cryptology
Volume19
Issue number3
DOIs
StatePublished - Jul 2006

Keywords

  • Adaptive chosen-ciphertext attacks
  • Public-key encryption
  • Simulation-sound non-interactive zero-knowledge

Fingerprint

Dive into the research topics of 'A simpler construction of CCA2-secure public-key encryption under general assumptions'. Together they form a unique fingerprint.

Cite this