Public-key encryption in a multi-user setting: Security proofs and improvements

被引:0
|
作者
Bellare, M
Boldyreva, A
Micali, S
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses the security of public-key cryptosystems in a "multi-user" setting, namely in the presence of attacks involving the encryption of related messages under different public keys, as exemplified by Hastad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sense of "indistinguishability," thereby pin-pointing many schemes guaranteed to be secure against Hastad-type attacks. We then highlight the importance, in practice, of considering and improving the concrete security of the general reduction, and present such improvements for two Diffie-Hellman based schemes, namely El Gamal and Cramer-Shoup.
引用
收藏
页码:259 / 274
页数:16
相关论文
共 50 条
  • [31] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [32] Selectively chosen ciphertext security in threshold public-key encryption
    Kim, Kitak
    Park, Jong Hwan
    Lee, Dong Hoon
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 189 - 200
  • [33] Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Domingo-Ferrer, Josep
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 62 - 76
  • [34] How to enhance the security of public-key encryption at minimum cost
    Fujisaki, E
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 24 - 32
  • [35] Relations among notions of security for public-key encryption schemes
    Bellare, M
    Desai, A
    Pointcheval, D
    Rogaway, P
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 26 - 45
  • [36] On Signatures with Tight Security in the Multi-User Setting
    Hanaoka, Goichiro
    Schuldt, Jacob C. N.
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 91 - 95
  • [37] Security of Signature Schemes in a Multi-User Setting
    Alfred Menezes
    Nigel Smart
    Designs, Codes and Cryptography, 2004, 33 : 261 - 274
  • [38] Security of signature schemes in a multi-user setting
    Menezes, A
    Smart, N
    DESIGNS CODES AND CRYPTOGRAPHY, 2004, 33 (03) : 261 - 274
  • [39] A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings
    Zhang, Shuo
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    SENSORS, 2020, 20 (23) : 1 - 19
  • [40] Multi-User Security of CCM Authenticated Encryption Mode
    Zhang, Xiangyang
    Shen, Yaobin
    Wang, Lei
    PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, : 4331 - 4345