Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption

被引:0
|
作者
Chen, Kaiming [1 ]
Miyaji, Atsuko [1 ]
Chen, Jiageng [2 ]
机构
[1] Osaka Univ, Grad Sch Engn, Osaka, Japan
[2] Cent China Normal Univ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Updatable Public Key Encryption; Key Encapsulation Mechanism; Secure Messaging Protocols;
D O I
10.1007/978-981-97-9053-1_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Updatable Public Key Encryption (UPKE) is a technique for updating public and private keys in secure messaging protocols, which was initially introduced by Jost et al. (EUROCRYPTO '19). Alwen et al. (CRYPTO '20) later provided an IND-CPA secure UPKE. Asano et al., in turn, applied the FO transformation to UPKE outputs to achieve IND-CCA security. However, their approach doubles the time complexity, as they treat the IND-CPA UPKE as a black box that runs the encryption process once. In this paper, we formalize an IND-CCA model for key encapsulation mechanisms that involve a one-way homomorphic function which is named key homomorphism (KhKEM). If we construct a UPKE scheme from an IND-CCA KhKEM, a one-way secure pseudorandom generator, and an IND-CCA Encrypt-then-MAC symmetric encryption scheme, we demonstrate that this generic hybrid UPKE design will be IND-CCA secure. We finally consider three KhKEM instances and discuss the parameters and efficiency. We show that our scheme has better efficiency compared with Asano et al.'s scheme.
引用
收藏
页码:168 / 185
页数:18
相关论文
共 50 条
  • [21] Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
    Liang, Bei
    Zhang, Rui
    Li, Hongda
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 193 - 206
  • [22] Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption
    Faonio, Antonio
    Fiore, Dario
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 271 - 291
  • [23] A CCA secure public key encryption scheme based on finite groups of Lie type
    Hong, Haibo
    Shao, Jun
    Wang, Licheng
    Xie, Mande
    Wei, Guiyi
    Yang, Yixian
    Han, Song
    Lin, Jianhong
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [24] Homomorphic Encryption: From Private-Key to Public-Key
    Rothblum, Ron
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 219 - 234
  • [25] Secure Data in Cloud Computing Using Fully Homomorphic Encryption and Public Key Infrastructure
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 5950 - 5958
  • [26] Efficient Updatable Public-Key Encryption from Lattices
    Abou Haidar, Calvin
    Passelegue, Alain
    Stehle, Damien
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 342 - 373
  • [27] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [28] Cryptanalysis of an additively homomorphic public key encryption scheme
    Hong, Zhiyong
    Zhou, Liguo
    Zhan, Yu
    Liu, Chengdong
    Wang, Baocang
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [29] Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key
    Liu, Yamin
    Li, Bao
    Lu, Xianhui
    Jia, Dingding
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 310 - 318
  • [30] CCA-1 Secure Updatable Encryption with Adaptive Security
    Chen, Huanhuan
    Galteland, Yao Jiang
    Liang, Kaitai
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT V, 2023, 14442 : 374 - 406