2010
DOI: 10.1007/978-3-642-12678-9_20
|View full text |Cite
|
Sign up to set email alerts
|

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions

Abstract: Abstract. Public-key encryption schemes with non-interactive opening (PKENO) allow a receiver to non-interactively convince third parties that a ciphertext decrypts to a given plaintext or, alternatively, that such a ciphertext is invalid. Two practical generic constructions for PKENO have been proposed so far, starting from either identity-based encryption or public-key encryption with witness-recovering decryption (PKEWR). We show that the known transformation from PKEWR to PKENO fails to provide chosen-ciph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(25 citation statements)
references
References 32 publications
(55 reference statements)
0
25
0
Order By: Relevance
“…We note that the used approach to the verification of a decryption result is essentially the same as that used by Galindo et al [17] in the context of public key encryption with non-interactive opening (PKENO). Furthermore, we note that in [17], the application of PKENO schemes to group signature is briefly discussed as a mechanism for simplifying the construction of an opening.…”
Section: The Modified Groth Schemementioning
confidence: 99%
See 2 more Smart Citations
“…We note that the used approach to the verification of a decryption result is essentially the same as that used by Galindo et al [17] in the context of public key encryption with non-interactive opening (PKENO). Furthermore, we note that in [17], the application of PKENO schemes to group signature is briefly discussed as a mechanism for simplifying the construction of an opening.…”
Section: The Modified Groth Schemementioning
confidence: 99%
“…Furthermore, we note that in [17], the application of PKENO schemes to group signature is briefly discussed as a mechanism for simplifying the construction of an opening. Here, we will show that this approach is able to ensure the opening soundness of group signature schemes.…”
Section: The Modified Groth Schemementioning
confidence: 99%
See 1 more Smart Citation
“…The notion of security is such that the state of the adversary returned by those simulators is statistically indistinguishable from the state of the adversary in the real-life model. A different kind of scheme for proof of knowledge named Public Key Encryption with Non-interactive Openning (PKENO) in standard model [4][5][6]11] has been proposed, which is more efficient than the known NIZK proofs in standard model. For proving the knowledge, a verifier needs to know the (ciphertext, proof, plaintext)-tuple.…”
Section: Threshold Two-party Computationmentioning
confidence: 99%
“…In order to have efficient tracing, we ask that DT BE is non-interactive and robust. As was noted by [31], such a propety simplifies tracing even in traditional group signatures with a single tracing manager. Finally, we require a collision-resistant hash function H : {0, 1} * → T DT BE .…”
Section: Our Generic Constructionmentioning
confidence: 99%