all InfoSec news
Memory-Tight Multi-Challenge Security of Public-Key Encryption
March 3, 2023, 4:06 p.m. |
IACR News www.iacr.org
ePrint Report: Memory-Tight Multi-Challenge Security of Public-Key Encryption
Joseph Jaeger, Akshaya Kumar
We give the first examples of public-key encryption schemes which can be proven to achieve multi-challenge, multi-user CCA security via reductions that are tight in time, advantage, and memory. Our constructions are obtained by applying the KEM-DEM paradigm to variants of Hashed ElGamal and the Fujisaki-Okamoto transformation that are augmented by adding uniformly random strings to their ciphertexts and/or keys.
The reductions carefully combine recent proof techniques introduced …
cca challenge encryption eprint report key keys memory paradigm public random report security strings transformation
More from www.iacr.org / IACR News
Jobs in InfoSec / Cybersecurity
Security Architect
@ Alter Solutions | Lisboa, Portugal
Information Security Program Manager
@ Fisher Investments | Tampa, FL, United States
Digital Security Infrastructure Manager
@ Wizz Air | Budapest, HU, H-1103
Sr. Solution Consultant
@ Highspot | Sydney
Cyber Security Analyst III
@ Love's Travel Stops | Oklahoma City, OK, US, 73120
Lead Security Engineer
@ JPMorgan Chase & Co. | Tampa, FL, United States