Tag-KEM/DEM

A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM

Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a novel framework for generic construction of hybrid encryption schemes secure against chosen ciphertext attack. Our new framework yields new and more efficient CCA-secure schemes, and provides insightful explanations about existing schemes that do not fit into the previous frameworks. This could result in finding future improvements. Moreover, it allows immediate conversion from a class of threshold public-key encryption to a hybrid one without considerable overhead, which is not possible in the previous approaches. Finally we present an improved security proof of the Kurosawa-Desmedt scheme, which removes the original need for information-theoretic key derivation and message authentication functions. We show that the scheme can be instantiated with any computationally secure such functions, thus extending the applicability of their paradigm, and improving its efficiency.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science
EditorsR. Cramer
Pages128-146
Number of pages19
Volume3494
StatePublished - 2005
Event24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT 2005 - Aarhus, Denmark
Duration: May 22 2005May 26 2005

Other

Other24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT 2005
CountryDenmark
CityAarhus
Period5/22/055/26/05

Fingerprint

Cryptography
Authentication

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Abe, M., Gennaro, R., Kurosawa, K., & Shoup, V. (2005). Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In R. Cramer (Ed.), Lecture Notes in Computer Science (Vol. 3494, pp. 128-146)

Tag-KEM/DEM : A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. / Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor.

Lecture Notes in Computer Science. ed. / R. Cramer. Vol. 3494 2005. p. 128-146.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abe, M, Gennaro, R, Kurosawa, K & Shoup, V 2005, Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. in R Cramer (ed.), Lecture Notes in Computer Science. vol. 3494, pp. 128-146, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology - EUROCRYPT 2005, Aarhus, Denmark, 5/22/05.
Abe M, Gennaro R, Kurosawa K, Shoup V. Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In Cramer R, editor, Lecture Notes in Computer Science. Vol. 3494. 2005. p. 128-146
Abe, Masayuki ; Gennaro, Rosario ; Kurosawa, Kaoru ; Shoup, Victor. / Tag-KEM/DEM : A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. Lecture Notes in Computer Science. editor / R. Cramer. Vol. 3494 2005. pp. 128-146
@inproceedings{50cb545d826440738be136ef647a89a8,
title = "Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM",
abstract = "This paper presents a novel framework for generic construction of hybrid encryption schemes secure against chosen ciphertext attack. Our new framework yields new and more efficient CCA-secure schemes, and provides insightful explanations about existing schemes that do not fit into the previous frameworks. This could result in finding future improvements. Moreover, it allows immediate conversion from a class of threshold public-key encryption to a hybrid one without considerable overhead, which is not possible in the previous approaches. Finally we present an improved security proof of the Kurosawa-Desmedt scheme, which removes the original need for information-theoretic key derivation and message authentication functions. We show that the scheme can be instantiated with any computationally secure such functions, thus extending the applicability of their paradigm, and improving its efficiency.",
author = "Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup",
year = "2005",
language = "English (US)",
volume = "3494",
pages = "128--146",
editor = "R. Cramer",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - Tag-KEM/DEM

T2 - A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM

AU - Abe, Masayuki

AU - Gennaro, Rosario

AU - Kurosawa, Kaoru

AU - Shoup, Victor

PY - 2005

Y1 - 2005

N2 - This paper presents a novel framework for generic construction of hybrid encryption schemes secure against chosen ciphertext attack. Our new framework yields new and more efficient CCA-secure schemes, and provides insightful explanations about existing schemes that do not fit into the previous frameworks. This could result in finding future improvements. Moreover, it allows immediate conversion from a class of threshold public-key encryption to a hybrid one without considerable overhead, which is not possible in the previous approaches. Finally we present an improved security proof of the Kurosawa-Desmedt scheme, which removes the original need for information-theoretic key derivation and message authentication functions. We show that the scheme can be instantiated with any computationally secure such functions, thus extending the applicability of their paradigm, and improving its efficiency.

AB - This paper presents a novel framework for generic construction of hybrid encryption schemes secure against chosen ciphertext attack. Our new framework yields new and more efficient CCA-secure schemes, and provides insightful explanations about existing schemes that do not fit into the previous frameworks. This could result in finding future improvements. Moreover, it allows immediate conversion from a class of threshold public-key encryption to a hybrid one without considerable overhead, which is not possible in the previous approaches. Finally we present an improved security proof of the Kurosawa-Desmedt scheme, which removes the original need for information-theoretic key derivation and message authentication functions. We show that the scheme can be instantiated with any computationally secure such functions, thus extending the applicability of their paradigm, and improving its efficiency.

UR - http://www.scopus.com/inward/record.url?scp=24944516264&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944516264&partnerID=8YFLogxK

M3 - Conference contribution

VL - 3494

SP - 128

EP - 146

BT - Lecture Notes in Computer Science

A2 - Cramer, R.

ER -