Method for enhancing security of public key encryption schemas
First Claim
1. A public key encryption method taking at the input a message M to be encrypted and the public key pk and returning at the output the encrypted message C, said method using a public key probabilistic encryption algorithm EP taking at the input a message mp and a random number u and returning at the output an encrypted item cp, said method also using a secret key encryption algorithm ES taking at the input a message ms and returning at the output an encrypted item cs, said public key probabilistic encryption method using the key pk for encrypting a message, also using a hash function F taking at the input a random number r and the message M, a hash function G and a hash function H, characterised in that it comprises the following eight steps:
- a) Randomly generating a random number r;
b) Applying the hash function F to the message M and to the random number r in order to obtain s;
c) Applying the hash function H to s and performing an Exclusive OR of the result with r in order to obtain t;
d) Defining the intermediate message w=s∥
t, where ∥
denotes the concatenation of two bit strings;
e) Applying the encryption algorithm EP to the intermediate message w and to a random number u in order to obtain c1, using the public key pk;
f) Applying the hash function G to w and c1 in order to obtain k;
g) Applying the encryption algorithm ES to the message M using the key k in order to obtain the encrypted item c2;
h) The encrypted message C is C=c1∥
c2.
2 Assignments
0 Petitions
Accused Products
Abstract
There exist numerous public key probabilistic encryption algorithms. Most of said algorithms do not have a maximum security level against someone capable of chosen ciphertext attacks. The method consists in a construct enabling to enhance the security of any public key probabilistic or deterministic encryption algorithm to achieve optimal security level.
13 Citations
9 Claims
-
1. A public key encryption method taking at the input a message M to be encrypted and the public key pk and returning at the output the encrypted message C, said method using a public key probabilistic encryption algorithm EP taking at the input a message mp and a random number u and returning at the output an encrypted item cp, said method also using a secret key encryption algorithm ES taking at the input a message ms and returning at the output an encrypted item cs, said public key probabilistic encryption method using the key pk for encrypting a message, also using a hash function F taking at the input a random number r and the message M, a hash function G and a hash function H, characterised in that it comprises the following eight steps:
-
a) Randomly generating a random number r;
b) Applying the hash function F to the message M and to the random number r in order to obtain s;
c) Applying the hash function H to s and performing an Exclusive OR of the result with r in order to obtain t;
d) Defining the intermediate message w=s∥
t, where ∥
denotes the concatenation of two bit strings;
e) Applying the encryption algorithm EP to the intermediate message w and to a random number u in order to obtain c1, using the public key pk;
f) Applying the hash function G to w and c1 in order to obtain k;
g) Applying the encryption algorithm ES to the message M using the key k in order to obtain the encrypted item c2;
h) The encrypted message C is C=c1∥
c2. - View Dependent Claims (2, 5, 6, 7, 8, 9)
-
-
3. A public key encryption method taking at the input a message M to be encrypted and the public key pk and returning at the output the encrypted message C, said method using a public key deterministic encryption algorithm EP taking at the input a message mp and returning at the output an encrypted item cp, said method also using a secret key encryption algorithm ES taking at the input a message ms and returning at the output an encrypted item cs, said public key deterministic encryption method using the key pk for encrypting a message, also using a hash function F taking at the input a random number r and the message M, a hash function G and a hash function H, characterised in that it comprises the following nine steps:
-
i) Randomly generating a random number r;
j) Applying the hash function F to the message M and to the random number r in order to obtain s;
k) Applying the hash function H to s and performing an Exclusive OR of the result with r in order to obtain t;
l) Defining the intermediate message w=s∥
t, where ∥
denotes the concatenation of two bit strings;
m) Applying the encryption algorithm EP to the intermediate message w in order to obtain c1, using the public key pk;
n) Applying the hash function G to w and c1 in order to obtain k;
o) Applying the encryption algorithm ES to the message M using the key k in order to obtain the encrypted item c2;
p) The encrypted message C is C=c1∥
c2. - View Dependent Claims (4)
-
Specification