SENDER-EQUIVOCABLE ENCRYPTION SCHEMES SECURE AGAINST CHOSEN-CIPHERTEXT ATTACKS REVISITED

被引:1
|
作者
Huang, Zhengan [1 ]
Liu, Shengli [1 ]
Qin, Baodong [1 ,2 ]
Chen, Kefei [3 ,4 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Southwest Univ Sci & Technol, Coll Comp Sci & Technol, Mianyang 621010, Sichuan, Peoples R China
[3] Hangzhou Normal Univ, Sch Sci, Hangzhou 310036, Peoples R China
[4] State Key Lab Math Engn & Adv Comp, Wuxi 214000, Peoples R China
关键词
sender-equivocable encryption; chosen-ciphertext attack; cross-authentication code;
D O I
10.1515/amcs-2015-0032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fehr et al. (2010) proposed the first sender-equivocable encryption scheme secure against chosen-ciphertext attacks (NC-CCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attacks (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attacks of a new primitive, the "cross-authentication code". However, the security of the cross-authentication code cannot be guaranteed when all the keys used in the code are exposed. Our key observation is that, in the NC-CCA security game, the randomness used in the generation of the challenge ciphertext is exposed to the adversary. Based on this observation, we provide a security analysis of Fehr et al.'s scheme, showing that its NC-CCA security proof is flawed. We also point out that the scheme of Fehr et al. encrypting a single-bit plaintext can be refined to achieve NC-CCA security, free of the cross-authentication code. Furthermore, we propose the notion of "strong cross-authentication code", apply it to Fehr et al.'s scheme, and show that the new version of the latter achieves NC-CCA security for multi-bit plaintexts.
引用
收藏
页码:415 / 430
页数:16
相关论文
共 50 条
  • [1] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 369 - 385
  • [2] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [3] New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack
    Desai, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 394 - 412
  • [5] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [6] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [7] Chosen-ciphertext attacks against MOSQUITO
    Joux, Antoine
    Muller, Frederic
    [J]. FAST SOFTWARE ENCRYPTION, 2006, 4047 : 390 - 404
  • [8] Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
    [J]. Sun, Jin (oksunjin@xaut.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08):
  • [9] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
  • [10] Efficient chosen-ciphertext secure hybrid encryption scheme tolerating continuous leakage attacks
    Zhou, Yanwei
    Yang, Bo
    Yu, Yong
    Khan, Arshad
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 39 - 47