Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010

Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen
{"title":"Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010","authors":"Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen","doi":"10.1109/INCoS.2013.69","DOIUrl":null,"url":null,"abstract":"There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The second approach was proposed in Eurocrypt 2010 by Fehr et al., who proved that sender equivocability under chosen-cipher text attacks (NC-CCA security) implies SO-CCA security. They also proposed a new primitive called ``cross-authentication code'', and used it to construct a public-key encryption (PKE) scheme (the FHKW scheme) achieving NC-CCA security. However, recently in PKC 2013, Huang et al. pointed out that the properties of cross-authentication code cannot guarantee the NC-CCA security of the FHKW scheme, i.e., the security proof of the FHKW scheme is flawed. In this paper, we propose the notion of ``strong cross-authentication code'', which helps to fix the security proof of the FHKW scheme. This strong notion captures the ability of a cross-authentication code to efficiently generate a new key, based on all the other keys and the cross-authentication tag, such that the new key is statistically indistinguishable from the original key. With this code as a building block, we construct a new version of the FHKW scheme, and prove it to be NC-CCA secure for multi-bit plaintexts. Our work makes possible the instantiation of simulation-based SO-CCA secure PKE with a multi-bit message space from NC-CCA secure PKEs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The second approach was proposed in Eurocrypt 2010 by Fehr et al., who proved that sender equivocability under chosen-cipher text attacks (NC-CCA security) implies SO-CCA security. They also proposed a new primitive called ``cross-authentication code'', and used it to construct a public-key encryption (PKE) scheme (the FHKW scheme) achieving NC-CCA security. However, recently in PKC 2013, Huang et al. pointed out that the properties of cross-authentication code cannot guarantee the NC-CCA security of the FHKW scheme, i.e., the security proof of the FHKW scheme is flawed. In this paper, we propose the notion of ``strong cross-authentication code'', which helps to fix the security proof of the FHKW scheme. This strong notion captures the ability of a cross-authentication code to efficiently generate a new key, based on all the other keys and the cross-authentication tag, such that the new key is statistically indistinguishable from the original key. With this code as a building block, we construct a new version of the FHKW scheme, and prove it to be NC-CCA secure for multi-bit plaintexts. Our work makes possible the instantiation of simulation-based SO-CCA secure PKE with a multi-bit message space from NC-CCA secure PKEs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
修正发送方模糊加密方案在Eurocrypt 2010
有两种主要的方法来实现选择性打开选择密文安全(SO-CCA安全):有损加密(包括几乎所有的有损陷门函数)和发送方模糊加密。第二种方法由Fehr等人在Eurocrypt 2010中提出,他们证明了选择密文攻击(NC-CCA安全)下的发送方模棱两可性意味着SO-CCA安全。他们还提出了一种名为“交叉认证码”的新原语,并用它构建了一个实现NC-CCA安全性的公钥加密(PKE)方案(FHKW方案)。然而,最近在PKC 2013中,Huang等人指出,交叉认证码的属性并不能保证FHKW方案的NC-CCA安全性,即FHKW方案的安全性证明是有缺陷的。在本文中,我们提出了“强交叉认证码”的概念,这有助于修正FHKW方案的安全性证明。这个强大的概念捕获了交叉身份验证代码基于所有其他密钥和交叉身份验证标记有效生成新密钥的能力,从而使新密钥在统计上与原始密钥无法区分。以该代码为构建块,构造了一个新版本的FHKW方案,并证明了该方案对多位明文具有NC-CCA安全性。我们的工作使基于仿真的SO-CCA安全PKE的实例化成为可能,该实例具有来自NC-CCA安全PKE的多比特消息空间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improved Efficient Priority-and-Activity-Based QoS MAC Protocol Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying Systems RLWE-Based Homomorphic Encryption and Private Information Retrieval A Spatially Varying Mean and Variance Active Contour Model A Secure Cloud Storage System from Threshold Encryption
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1