Separations in circular security for arbitrary length key cycles, revisited

被引:2
|
作者
Chang, Jinyong [1 ,2 ]
Dai, Honglong [1 ]
Xu, Maozhi [1 ]
Xue, Rui [2 ]
机构
[1] Peking Univ, Sch Math, Beijing 100871, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
circular security; CCA security; hybrid encryption; KEM; MAC; indistinguishability obfuscation;
D O I
10.1002/sec.1705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The circular security of public key encryptions has been drawn great attentions in recent years. The relationship of notions between circular securities and standard ones such as chosen plaintext security (CPA-security) and chosen ciphertext security (CCA-security) deserve to be clarified. For any integer n>0 and n2, whether the notions of n-circular securities can be implied by that of their standard correspondences, such as CPA or CCA security in public key setting, has largely remained open. Koppula, Ramchen, and Waters in TCC'15 recently made a separation in CPA case by proposing a CPA secure scheme that is not n-circular secure based on the recent candidate constructions of indistinguishable obfuscation. In this work, we consider the CCA case. In particular, inspired by the indistinguishable-obfuscation-based construction of Koppula et al., we obtain the following results: We make a separation between the n-circular CCA security and CCA security for anyn>0. Specifically, we propose a hybrid encryption scheme that achieves the CCA security but fails even in the n-circular CPA security. Hence, that makes a separation between the CCA security and the n-circular CCA security (and even the n-circular CPA security). By revising the previous construction, we also present a CCA secure (hybrid encryption) scheme, which allows an adversary to recover all secret keys when obtaining an encrypted key cycle. Hence, that implies that: if a key cycle arises in a system, then a passive adversary might be able to recover all secret keys even if CCA-secure encryptions are used. The results in this work, together with that of Koppula et al., confirm that notions of circular securities are stronger than their standard correspondences. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5392 / 5400
页数:9
相关论文
共 50 条
  • [1] Separations in Circular Security for Arbitrary Length Key Cycles
    Koppula, Venkata
    Ramchen, Kim
    Waters, Brent
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 378 - 400
  • [2] Circular Security Separations for Arbitrary Length Cycles from LWE
    Koppula, Venkata
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 681 - 700
  • [3] Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
    Goyal, Rishab
    Koppula, Venkata
    Waters, Brent
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 : 232 - 246
  • [4] New Definitions and Separations for Circular Security
    Cash, David
    Green, Matthew
    Hohenberger, Susan
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 540 - 557
  • [5] Cycles of Arbitrary Length in Distance Graphs on Fdq
    Iosevich, A.
    Jardine, G.
    McDonald, B.
    [J]. PROCEEDINGS OF THE STEKLOV INSTITUTE OF MATHEMATICS, 2021, 314 (01) : 27 - 43
  • [6] Deciding key cycles for security protocols
    Cortier, Veronique
    Zalinescu, Eugen
    [J]. LOGIC FOR PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND REASONING, PROCEEDINGS, 2006, 4246 : 317 - +
  • [7] Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys
    Chau, H. F.
    [J]. PHYSICAL REVIEW A, 2020, 102 (01)
  • [8] Smart Dust Security - Key Infection Revisited
    Cvrcek, Daniel
    Svenda, Petr
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) : 11 - 25
  • [9] Security of quantum key distribution with arbitrary individual imperfections
    Maroy, Oystein
    Lydersen, Lars
    Skaar, Johannes
    [J]. PHYSICAL REVIEW A, 2010, 82 (03):
  • [10] Cycles and sinks: two key elements of a circular economy
    Ulrich Kral
    Leo S. Morf
    Dana Vyzinkarova
    Paul H. Brunner
    [J]. Journal of Material Cycles and Waste Management, 2019, 21 : 1 - 9