Public key encryption without random oracle made truly practical

  • Authors:
  • Puwen Wei;Xiaoyun Wang;Yuliang Zheng

  • Affiliations:
  • Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China;Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China;Department of Software and Information Systems, University of North Carolina at Charlotte, Charlotte, NC

  • Venue:
  • ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

An important research area in the past decade is to search for efficient cryptographic schemes that do not rely for their security on the controversial random oracle assumption. In this paper, we continue this line of endeavors and report our success in identifying a very efficient public key encryption scheme whose formal security proof does not require a random oracle. Specifically, we show how to modify a universal hash based public key encryption scheme proposed by Zheng and Seberry at Crypto'92, in such a way that the resultant scheme not only preserves efficiency but also admits provable security against adaptive chosen ciphertext attack without a random oracle. We also compare the modified Zheng-Seberry scheme with related encryption schemes in terms of efficiency and underlying assumptions, supporting our conclusion that the modified Zheng-Seberry scheme is preferable to its competitors.