Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions

被引:3
|
作者
Hara, Keisuke [1 ,2 ]
Kitagawa, Fuyuki [1 ]
Matsuda, Takahiro [2 ]
Hanaoka, Goichiro [2 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo Tech, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
基金
日本学术振兴会;
关键词
Public key encryption; Receiver selective opening security; Chosen ciphertext security; ENCRYPTION;
D O I
10.1016/j.tcs.2019.08.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the situation where there are one sender and multiple receivers and the sender transmits ciphertexts of correlated plaintexts, a receiver selective opening (RSO) attack for a public key encryption (PKE) scheme considers adversaries that can corrupt some of the receivers and get their secret keys and plaintexts. Security against RSO attacks for a PKE scheme ensures confidentiality of ciphertexts of uncorrupted receivers. Simulation-based RSO security against chosen ciphertext attacks (SIM-RSO-CCA) is the strongest security notion in all RSO attack scenarios. Jia, Lu, and Li (2016) [19] proposed the first SIMRSO-CCA secure PKE scheme. However, their scheme used indistinguishability obfuscation, which is not known to be constructed from any standard computational assumption. In this paper, we give two contributions for constructing SIM-RSO-CCA secure PKE from standard computational assumptions. Firstly, we propose a generic construction of SIMRSO-CCA secure PKE using an IND-CPA secure PKE scheme and a non-interactive zero-knowledge proof system satisfying one-time simulation soundness. Secondly, we propose an efficient and concrete construction of SIM-RSO-CCA secure PKE based on the decisional Diffie-Hellman (DDH) assumption. Moreover, we give a method for efficiently expanding the plaintext space of the DDH-based construction. By applying this method to the construction, we obtain the first DDH-based SIM-RSO-CCA secure PKE scheme supporting a super-polynomially large plaintext space with compact ciphertexts. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:570 / 597
页数:28
相关论文
共 25 条
  • [1] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions
    Hara, Keisuke
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 140 - 159
  • [2] Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
    Liu, Shengli
    Paterson, Kenneth G.
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 3 - 26
  • [3] Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions
    Lu, Yi
    Hara, Keisuke
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (09) : 1206 - 1218
  • [4] Improved lattice-based CCA2-secure PKE in the standard model
    Jiang Zhang
    Yu Yu
    Shuqin Fan
    Zhenfeng Zhang
    [J]. Science China Information Sciences, 2020, 63
  • [5] Improved lattice-based CCA2-secure PKE in the standard model
    Jiang ZHANG
    Yu YU
    Shuqin FAN
    Zhenfeng ZHANG
    [J]. Science China(Information Sciences), 2020, 63 (08) : 147 - 168
  • [6] Improved lattice-based CCA2-secure PKE in the standard model
    Zhang, Jiang
    Yu, Yu
    Fan, Shuqin
    Zhang, Zhenfeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (08)
  • [7] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [8] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [9] Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 62 - 92
  • [10] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +