Public-Key Encryption Schemes With Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
- Mayana Pereira ,
- Rafael Dowsley ,
- Anderson C.A. Nascimento ,
- Goichiro Hanaoka
The Computer Journal | , Vol 58(10): pp. 2738-2746
Publication | Publication | Publication | Publication | Publication
In a public key encryption scheme was proposed against adversaries with a bounded number of decryption queries based on the decisional Diffie-Helman Problems. In this paper, we show that the same result can be easily obtained based on weaker computational assumptions, namely: the computational Diffie-Helman assumption and the hashed Diffie-Helman assumption.