Public-key encryption in a multi-user setting: Security proofs and improvements

被引:0
|
作者
Bellare, M
Boldyreva, A
Micali, S
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses the security of public-key cryptosystems in a "multi-user" setting, namely in the presence of attacks involving the encryption of related messages under different public keys, as exemplified by Hastad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sense of "indistinguishability," thereby pin-pointing many schemes guaranteed to be secure against Hastad-type attacks. We then highlight the importance, in practice, of considering and improving the concrete security of the general reduction, and present such improvements for two Diffie-Hellman based schemes, namely El Gamal and Cramer-Shoup.
引用
收藏
页码:259 / 274
页数:16
相关论文
共 50 条
  • [21] New security notions and relations for public-key encryption
    Sepahi, Reza
    Pieprzyk, Josef
    Shahandashti, Siamak F.
    Schoenmakers, Berry
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (3-4) : 183 - 227
  • [22] Cryptographically sound security proofs for basic and public-key Kerberos
    Backes, M.
    Cervesato, I.
    Jaggard, A. D.
    Scedrov, A.
    Tsay, J. -K.
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 362 - 383
  • [23] PUBLIC-KEY ENCRYPTION
    STUBBS, E
    EDN MAGAZINE-ELECTRICAL DESIGN NEWS, 1984, 29 (04): : 29 - 29
  • [24] Revocation-free public-key encryption based on security-mediated public-key infrastructure
    Lo, C. -M.
    Hwang, T.
    Li, C. -M.
    IET INFORMATION SECURITY, 2007, 1 (03) : 134 - 141
  • [25] A refined definition of semantic security for public-key encryption schemes
    Sakai, H
    Nakamura, N
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (01): : 34 - 39
  • [26] Revocable and anonymous searchable encryption in multi-user setting
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Zhiquan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1204 - 1218
  • [27] Security-enhanced public-key authenticated searchable encryption
    Cheng, Leixiao
    Qin, Jing
    Feng, Feng
    Meng, Fei
    INFORMATION SCIENCES, 2023, 647
  • [28] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [29] Multi-instance Secure Public-Key Encryption
    Brunetta, Carlo
    Heum, Hans
    Stam, Martijn
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 336 - 367
  • [30] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 53 - 68