2 research outputs found
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication
In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen
ciphertext security, that is, ciphertexts with public verifiability. Independently, we introduced
a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (PVPKE), and discussed its application in proxy reencryption
(PRE) and threshold public key encryption (TPKE). In Crypto’09, Hofheiz and Kiltz introduced
the group of signed quadratic residues and discussed its application; the most interesting feature
of this group is its “gap” property, while the computational problem is as hard as factoring, and
the corresponding decisional problem is easy. In this paper, we give new constructions of PVPKE
scheme based on signed quadratic residues and analyze their security. We also discuss PVPKE’s
important application in modern information systems, such as achieving ciphertext checkable
in the cloud setting for the mobile laptop, reducing workload by the gateway between the open
internet and the trusted private network, and dropping invalid ciphertext by the routers for
helping the network to preserve its communication bandwidth