{"id":"https://openalex.org/W2090208476","doi":"https://doi.org/10.5220/0005048802990306","title":"KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited","display_name":"KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2090208476","doi":"https://doi.org/10.5220/0005048802990306","mag":"2090208476"},"language":"en","primary_location":{"id":"doi:10.5220/0005048802990306","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005048802990306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053498620","display_name":"Jinyong Chang","orcid":"https://orcid.org/0000-0002-6569-5152"},"institutions":[{"id":"https://openalex.org/I115067436","display_name":"Changzhi University","ror":"https://ror.org/04svmxd14","country_code":"CN","type":"education","lineage":["https://openalex.org/I115067436"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinyong Chang","raw_affiliation_strings":["Chinese Academy of Sciences and Changzhi University, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences and Changzhi University, China","institution_ids":["https://openalex.org/I115067436","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079155690","display_name":"Rui Xue","orcid":"https://orcid.org/0000-0001-6024-3635"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Xue","raw_affiliation_strings":["Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053498620"],"corresponding_institution_ids":["https://openalex.org/I115067436","https://openalex.org/I19820366"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09887233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"299","last_page":"306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6732397079467773},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6380218267440796},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6318643093109131},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6294690370559692},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5647814273834229},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5569592714309692},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5548268556594849},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4981968402862549},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4938722252845764},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.4764155149459839},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.46172207593917847},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4578373432159424},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.45608752965927124},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.44015786051750183},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.41157248616218567},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35598739981651306},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.28813838958740234},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.2262868881225586},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.10341086983680725}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6732397079467773},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6380218267440796},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6318643093109131},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6294690370559692},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5647814273834229},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5569592714309692},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5548268556594849},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4981968402862549},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4938722252845764},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4764155149459839},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.46172207593917847},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4578373432159424},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.45608752965927124},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.44015786051750183},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.41157248616218567},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35598739981651306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28813838958740234},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.2262868881225586},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.10341086983680725},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005048802990306","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0005048802990306","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W12398441","https://openalex.org/W1949164874","https://openalex.org/W1956945926","https://openalex.org/W2073210531","https://openalex.org/W2093678351","https://openalex.org/W2097215149","https://openalex.org/W2101479224","https://openalex.org/W2165111290","https://openalex.org/W2165210192","https://openalex.org/W2169265599"],"related_works":["https://openalex.org/W1511745870","https://openalex.org/W1557288322","https://openalex.org/W2101803085","https://openalex.org/W1572695506","https://openalex.org/W2109365488","https://openalex.org/W2950576867","https://openalex.org/W2613185318","https://openalex.org/W2415181691","https://openalex.org/W28861363","https://openalex.org/W1563221498"],"abstract_inverted_index":{"An":[0],"encryption":[1],"scheme":[2,96],"is":[3,14],"key-dependent":[4,42],"message":[5,43],"chosen":[6,44],"plaintext":[7],"attack":[8,46],"(KDM-CPA)":[9],"secure":[10,15,72,95],"means":[11],"that":[12,24,36],"it":[13],"even":[16],"if":[17],"an":[18],"adversary":[19],"obtains":[20],"encryptions":[21],"of":[22,109,119,140],"messages":[23],"depend":[25],"on":[26],"the":[27,74,100,116,120,128,138,151,172],"secret":[28],"key.":[29],"However,":[30],"there":[31],"are":[32,37,67],"not":[33],"many":[34],"schemes":[35],"KDM-CPA":[38],"secure,":[39],"let":[40],"alone":[41],"ciphertext":[45],"(KDM-CCA)":[47],"secure.":[48],"So":[49],"far,":[50],"only":[51],"two":[52],"general":[53],"constructions,":[54],"due":[55],"to":[56,69,163,171],"Camenisch,":[57],"Chandran,":[58],"and":[59,63,88,122],"Shoup":[60],"(Eurocrypt":[61,65],"2009),":[62],"Hofheinz":[64],"2013),":[66,91],"known":[68],"be":[70],"KDM-CCA":[71,94,117,131],"in":[73,125,153,160],"standard":[75],"model.":[76],"Another":[77],"scheme,":[78],"a":[79,93,106,168],"concrete":[80],"implementation,":[81],"was":[82,97],"recently":[83],"proposed":[84],"by":[85,155],"Qin,":[86],"Liu":[87],"Huang":[89],"(ACISP":[90],"where":[92],"obtained":[98],"from":[99],"classic":[101],"Cramer-Shoup":[102],"(CS)":[103],"cryptosystem":[104],"w.r.t.":[105,133],"new":[107],"family":[108],"functions.":[110],"In":[111,144],"this":[112],"paper,":[113],"we":[114,146],"revisit":[115],"security":[118,132],"CS-scheme":[121,129],"prove":[123],"that,":[124],"two-user":[126,161],"case,":[127,165],"achieves":[130,167],"richer":[134],"ensembles,":[135],"which":[136,166],"covers":[137],"result":[139,152],"Qin":[141],"et":[142],"al.":[143],"addition,":[145],"present":[147],"another":[148],"proof":[149],"about":[150],"(QLH13)":[154],"extending":[156],"our":[157],"approach":[158],"used":[159],"case":[162],"n-user":[164],"tighter":[169],"reduction":[170],"decisional":[173],"Diffie-Hellman":[174],"(DDH)":[175],"assumption.":[176]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
