Skip to main content
Log in

Chameleon all-but-one extractable hash proof and its applications

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Wee H. Efficient chosen-ciphertext security via extractable hash proofs. In: Advances in Cryptology — CRYPTO, Santa Barbara, 2010. 314–332

    Google Scholar 

  2. Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. J Cryptol, 2009, 22: 470–504

    Article  MathSciNet  MATH  Google Scholar 

  3. Haralambiev K, Jager T, Kiltz E, et al. Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model. In: Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010. 1–18

    Google Scholar 

  4. Goldreich O, Levin L A. A hard-core predicate for all one-way functions. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, Seattle, 1989. 25–32

    Google Scholar 

  5. Lai J Z, Deng R H, Liu S L, et al. Efficient CCA-secure PKE from identity-based techniques. In: Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, 2010. 132–147

    Google Scholar 

  6. Kang L, Tang X H, Liu J F. Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability. Sci China Inf Sci, 2014, 57: 112112

    Article  Google Scholar 

  7. Liu Y M, Li B, Lu X H, et al. Efficient CCA-secure CDH based KEM balanced between ciphertext and key. In: Proceedings of the 16th Australasian Conference on Information Security and Privacy, Melbourne, 2011. 310–318

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61502400, 61571364), Natural Science Foundation of Shaanxi Province (Grant No. 2017JM6037), Seed Foundation of Innovation and Creation for Graduate Students in Northwestern Polytechnical University (Grant No. Z2017022), and National Key R&D Program of China (Grant No. SQ2017YFSF060097).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baodong Qin.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, G., Li, H., Qin, B. et al. Chameleon all-but-one extractable hash proof and its applications. Sci. China Inf. Sci. 61, 099103 (2018). https://doi.org/10.1007/s11432-017-9369-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9369-9

Navigation