New Construction of PVPKE Scheme Based on Signed Quadratic Residues

In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its "gap" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.

[1]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[2]  Xu An Wang,et al.  On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[3]  Juan Manuel González Nieto,et al.  Publicly verifiable ciphertexts , 2013, J. Comput. Secur..

[4]  Xu An Wang,et al.  CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications , 2013, J. Comput..

[5]  Xu An Wang,et al.  Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[6]  Ran Canetti,et al.  An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack , 1999, EUROCRYPT.

[7]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[8]  Eike Kiltz,et al.  The Group of Signed Quadratic Residues and Applications , 2009, CRYPTO.

[9]  Jin Li,et al.  Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.