Keyword : chosen-ciphertext security


Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1 ; pp. 165-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key encryptionchosen-ciphertext securitytight security
 Summary | Full Text:PDF(782.7KB)

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF(435.6KB)

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro HANAOKA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 1994-2006
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securityDiffie-Hellman assumption
 Summary | Full Text:PDF(409.5KB)

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF(397.8KB)

Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki ABE Eike KILTZ Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 22-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
chosen-ciphertext securityOAEPciphertext overhead
 Summary | Full Text:PDF(259.8KB)