Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption

被引:0
|
作者
Chen, Kaiming [1 ]
Miyaji, Atsuko [1 ]
Chen, Jiageng [2 ]
机构
[1] Osaka Univ, Grad Sch Engn, Osaka, Japan
[2] Cent China Normal Univ, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Updatable Public Key Encryption; Key Encapsulation Mechanism; Secure Messaging Protocols;
D O I
10.1007/978-981-97-9053-1_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Updatable Public Key Encryption (UPKE) is a technique for updating public and private keys in secure messaging protocols, which was initially introduced by Jost et al. (EUROCRYPTO '19). Alwen et al. (CRYPTO '20) later provided an IND-CPA secure UPKE. Asano et al., in turn, applied the FO transformation to UPKE outputs to achieve IND-CCA security. However, their approach doubles the time complexity, as they treat the IND-CPA UPKE as a black box that runs the encryption process once. In this paper, we formalize an IND-CCA model for key encapsulation mechanisms that involve a one-way homomorphic function which is named key homomorphism (KhKEM). If we construct a UPKE scheme from an IND-CCA KhKEM, a one-way secure pseudorandom generator, and an IND-CCA Encrypt-then-MAC symmetric encryption scheme, we demonstrate that this generic hybrid UPKE design will be IND-CCA secure. We finally consider three KhKEM instances and discuss the parameters and efficiency. We show that our scheme has better efficiency compared with Asano et al.'s scheme.
引用
收藏
页码:168 / 185
页数:18
相关论文
共 50 条
  • [41] Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
    Fujioka, Atsushi
    Okamoto, Yoshiaki
    Saito, Taiichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 76 - 91
  • [42] Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
    Susilo, Willy
    Dung Hoang Duong
    Huy Quoc Le
    Pieprzyk, Josef
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 107 - 127
  • [43] Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [44] Towards, a separation of semantic and CCA security for public key encryption
    Gertner, Yael
    Malkin, Tal
    Myers, Steven
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 434 - +
  • [46] A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions
    Yehuda Lindell
    Journal of Cryptology, 2006, 19 : 359 - 377
  • [47] CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs
    Zhao, Yi
    Liang, Kaitai
    Yang, Bo
    Chen, Liqun
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [48] A simpler construction of CCA2-secure public-key encryption under general assumptions
    Lindell, Y
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 241 - 254
  • [49] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [50] CCA2 secure public-key encryption scheme tolerating continual leakage attacks
    Zhou, YanWei
    Yang, Bo
    Zhang, Wenzheng
    Mu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4505 - 4519