2000
DOI: 10.7146/brics.v7i45.20212
|View full text |Cite
|
Sign up to set email alerts
|

A Generalisation, a Simplification and some Applications of Paillier’s Probabilistic Public-Key System

Abstract: Abstract. We propose a generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property. We show that the generalisation is as secure as Paillier's original system. We construct a threshold variant of the generalised scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given plaintexts, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
625
0
1

Year Published

2001
2001
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 317 publications
(627 citation statements)
references
References 8 publications
1
625
0
1
Order By: Relevance
“…The probabilistic encryption function of Paillier [Pai99], enhanced by threshold decryption [FPS00,DJ01], satisfies all required properties. This scheme has M = Z N for an RSA modulus N .…”
Section: Homomorphic Encryption Schemementioning
confidence: 99%
“…The probabilistic encryption function of Paillier [Pai99], enhanced by threshold decryption [FPS00,DJ01], satisfies all required properties. This scheme has M = Z N for an RSA modulus N .…”
Section: Homomorphic Encryption Schemementioning
confidence: 99%
“…On the other hand, schemes using mix-nets [1, 9-12, 14, 19, 22] and/or homomorphic encryption [3,6,7] may provide it.…”
Section: Universal Verifiability Of the Tallymentioning
confidence: 99%
“…In voting schemes based on homomorphic encryption [3,6,7] privacy relies on computational assumptions, and is thus not unconditional. When mix-nets are used, this is the same, since the latter applies on asymmetric encryptions of the votes.…”
Section: Unconditional Privacymentioning
confidence: 99%
“…It is based on the Paillier's cryptosystem [35,19]. Another version to share Paillier cryptosystem appears in [15].…”
Section: Examplesmentioning
confidence: 99%
“…For example, in voting scheme, such as [15,1], the authority can check the universally checkable proofs of validity of ciphertext and compute the tally. However, the result will no longer be a ciphertext that withstands CCA.…”
Section: Ind-ccamentioning
confidence: 99%