2019
DOI: 10.1007/978-3-030-26951-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Our benign proof system uses the "OR-Proof" technique from [1]. We notice that, in the context of tightly-secure reductions, the same technique from [1] has been used in [21] to instantiate their (Leakage-Resilient) Ardent Quasi-Adaptive Hash Proof System. We stress that in our work, in contrast with [21], the main reason to use the technique from [1] is because of its nice linear property that, in turn, allows for malleable proof system.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Our benign proof system uses the "OR-Proof" technique from [1]. We notice that, in the context of tightly-secure reductions, the same technique from [1] has been used in [21] to instantiate their (Leakage-Resilient) Ardent Quasi-Adaptive Hash Proof System. We stress that in our work, in contrast with [21], the main reason to use the technique from [1] is because of its nice linear property that, in turn, allows for malleable proof system.…”
Section: Related Workmentioning
confidence: 99%
“…We leave as open problem to provide a generic framework to instantiate (almost) tightly-secure Rand-RCCA-secure PKE. Possible starting points are the HPS-based frameworks of [35] for Rand-RCCA schemes and [21] for tightlysecure (LR-)CCA-secure schemes. Recently, Faonio and Russo [15] improved over the mix-net protocol of [13], giving a more efficient instantiation based on non publicly-verifiable Rand-RCCA PKE schemes; however, their construction requires a leakage-resilient scheme.…”
Section: Open Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, we can implement it with smaller parameters and do not need to compensate for the security loss. As a result, tightly secure schemes drew a lot of attention in the last few years, from basic primitives, such as PKE [14,15,22] and signature [1,16] schemes, to more advanced ones, such as (non-interactive) key exchange [18,23,11], zero-knowledge proof [3,2], IBE [10,6,21,24] and functional encryption [40] schemes. Currently, research is carried out to reduce the cost for tight security.…”
Section: Motivationmentioning
confidence: 99%
“…Currently, research is carried out to reduce the cost for tight security. For instance, for PKE, the public key size is shortened from being linear [14] (in the security parameter) to constant [15,22]. In particular, the scheme in [15] only has one element more in the ciphertext overhead than its non-tight counterpart [30] asymptotically.…”
Section: Motivationmentioning
confidence: 99%