Key Encapsulation to Designated Group
نویسندگان
چکیده
Most practical applications use hybrid encryption to deal with large plaintext messages since the efficiency of the public key encryption algorithm is low. As a main part of hybrid encryption schemes, Key Encapsulation Mechanism (KEM) allows a sender to generate a random session key and distribute it to recipient. In some communication scenario, one-to-group model is of importance. In this paper, we present a novel key encapsulation to designated group. In our mechanism, anyone can encapsulate a session key for a designated group and any recipient in the designated group can decapsulate the session key with his private key. Finally, we give a proof and show that our new mechanism is secure against adaptively chosen ciphertext attacks in standard model.
منابع مشابه
Proxy Key Re-encapsulation Mechanism for Group Communications
Many practical applications use hybrid encryption mechanism to deal with large plaintext messages or real-time communication since the performance of the public key encryption scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows a sender to generate a random session key and distribute it to recipient. In this paper we present a proxy key re-encaps...
متن کاملUniversally Composable Attribute-based Group Key Exchange
Several protocols implementing attribute-based group key exchange, which allows users with certain set of attributes to establish a session key, have been proposed in recent years. However, attacks on attribute-based group key exchange in current research have been considered only in stand-alone fashion. Thus these protocols may be vulnerable when run with other protocol sessions concurrently. ...
متن کاملSecure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. CCCA has less demanding security requirements than standard chosen-ciphertext (CCA) security (since it requires ...
متن کاملIdentity-Based Key-Encapsulation Mechanism from Multilinear Maps
We construct an Identity-Based Key Encapsulation Mechanism (IBKEM) in a generic “leveled” multilinear map setting and prove its security under multilinear decisional Diffie-Hellmanin assumption in the selective-ID model. Then, we make our IB-KEM translated to the GGH framework, which defined an “approximate” version of a multilinear group family from ideal lattices, and modify our proof of secu...
متن کاملOn the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
In this paper, we discuss the (im)possibility of constructing chosen ciphertext secure (CCA secure) key encapsulation mechanisms (KEMs) with low ciphertext overhead. More specifically, we rule out the existence of algebraic black-box reductions from the (bounded) CCA security of a natural class of KEMs to any non-interactive problem. The class of KEMs captures the structure of the currently mos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007