Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond

被引:0
|
作者
Persiano, Giuseppe [1 ,2 ]
Phan, Duong Hieu [3 ]
Yung, Moti [2 ,4 ]
机构
[1] Univ Salerno, Fisciano, Italy
[2] Google LLC, New York, NY 10011 USA
[3] Inst Polytech Paris, Telecom Paris, Paris, France
[4] Columbia Univ, New York, NY 10027 USA
来源
关键词
CHOSEN-CIPHERTEXT SECURITY;
D O I
10.1007/978-3-031-68379-4_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of (Receiver-) Anamorphic Encryption was put forth recently to show that a dictator (i.e., an overreaching government), which demands to get the receiver's private key and even dictates messages to the sender, cannot prevent the receiver from getting an additional covert anamorphic message from a sender. The model required an initial private collaboration to share some secret. There may be settings though where an initial collaboration may be impossible or performance-wise prohibitive, or cases when we need an immediate message to be sent without private key generation (e.g., by any casual sender in need). This situation, to date, somewhat limits the applicability of anamorphic encryption. To overcome this, in this work, we put forth the new notion of "public-key anamorphic encryption," where, without any initialization, any sender that has not coordinated in any shape or form with the receiver, can nevertheless, under the dictator control of the receiver's private key, send the receiver an additional anamorphic secret message hidden from the dictator. We define the new notion with its unique new properties, and then prove that, quite interestingly, the known CCA-secure Koppula-Waters (KW) system is, in fact, public-key anamorphic. We then describe how a public-key anamorphic scheme can support a new hybrid anamorphic encapsulation mode (KDEM) where the public-key anamorphic part serves a bootstrapping mechanism to activate regular anamorphic messages in the same ciphertext, thus together increasing the anamorphic channel capacity. Looking at the state of research thus far, we observe that the initial system (Eurocrypt'22) that was shown to have regular anamorphic properties is the CCA-secure Naor-Yung (and other related schemes). Here we identify that the KW CCA-secure scheme also provides a new type of anamorphism. Thus, this situation is hinting that there may be a connection between some types of CCA-secure schemes and some type of anamorphic schemes (in spite of the fact that the goals of the two primitives are fundamentally different); this question is foundational in nature. Given this, we identify a sufficient condition for a "CCA-secure scheme which is black-box reduced from a CPA secure scheme" to directly give rise to an "anamorphic encryption scheme!" Furthermore, we identify one extra property of the reduction, that yields a public-key anamorphic scheme as defined here.
引用
收藏
页码:422 / 455
页数:34
相关论文
共 50 条
  • [1] Efficient CCA-secure public-key encryption schemes from RSA-related assumptions
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 176 - +
  • [2] Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
    Qin, Baodong
    Liu, Shengli
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 19 - 36
  • [3] Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption
    Faonio, Antonio
    Russo, Luigi
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 172 - 196
  • [4] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [5] Tightly secure signatures and public-key encryption
    Hofheinz, Dennis
    Jager, Tibor
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (01) : 29 - 61
  • [6] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
  • [7] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [8] Tightly Secure Signatures and Public-Key Encryption
    Hofheinz, Dennis
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 590 - 607
  • [9] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
  • [10] Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
    Yao, Lisha
    Weng, Jian
    Yang, Anjia
    Liang, Xiaojian
    Wu, Zhenghao
    Jiang, Zike
    Hou, Lin
    INFORMATION SCIENCES, 2023, 624 : 777 - 795