Public-key encryption in a multi-user setting: Security proofs and improvements

被引:0
|
作者
Bellare, M
Boldyreva, A
Micali, S
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses the security of public-key cryptosystems in a "multi-user" setting, namely in the presence of attacks involving the encryption of related messages under different public keys, as exemplified by Hastad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sense of "indistinguishability," thereby pin-pointing many schemes guaranteed to be secure against Hastad-type attacks. We then highlight the importance, in practice, of considering and improving the concrete security of the general reduction, and present such improvements for two Diffie-Hellman based schemes, namely El Gamal and Cramer-Shoup.
引用
收藏
页码:259 / 274
页数:16
相关论文
共 50 条
  • [1] Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting
    Nishioka, Mototsugu
    Komatsu, Naohisa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 735 - 760
  • [2] Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search
    Xu, Yongliang
    Cheng, Hang
    Li, Jiguo
    Liu, Ximeng
    Zhang, Xinpeng
    Wang, Meiqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3234 - 3246
  • [3] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [4] Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
    Ling, Yunhao
    Zhang, Kai
    Chen, Jie
    Huang, Qiong
    Qian, Haifeng
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 105 - 126
  • [5] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [6] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    Cluster Computing, 2022, 25 : 2305 - 2316
  • [7] Public Key Encryption with Delegated Equality Test in a Multi-User Setting
    Ma, Sha
    Zhang, Mingwu
    Huang, Qiong
    Yang, Bo
    COMPUTER JOURNAL, 2015, 58 (04): : 986 - 1002
  • [8] Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting
    Wu, D. N.
    Gan, Q. Q.
    Wang, X. M.
    IEEE ACCESS, 2018, 6 : 42445 - 42453
  • [9] Public key signatures in the multi-user setting
    Galbraith, S
    Malone-Lee, J
    Smart, NP
    INFORMATION PROCESSING LETTERS, 2002, 83 (05) : 263 - 266
  • [10] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33