A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack

被引:12
|
作者
Desmedt, Yvo [1 ]
Gennaro, Rosario [2 ]
Kurosawa, Kaoru [3 ]
Shoup, Victor [4 ]
机构
[1] UCL, Dept Comp Sci, London, England
[2] IBM Corp, TJ Watson Res Ctr, Yorktown Hts, NY USA
[3] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki, Japan
[4] NYU, Dept Comp Sci, New York, NY USA
关键词
Public key encryption; Chosen ciphertext security; Projective hash proofs; PUBLIC-KEY ENCRYPTION;
D O I
10.1007/s00145-009-9051-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new encryption scheme which is secure against adaptive chosen-ciphertext attack (or CCA2-secure) in the standard model (i.e., without the use of random oracle). Our scheme is a hybrid one: it first uses a public-key step (the Key Encapsulation Module or KEM) to encrypt a random key, which is then used to encrypt the actual message using a symmetric encryption algorithm (the Data Encapsulation Module or DEM). Our scheme is a modification of the hybrid scheme presented by Shoup in (Euro-Crypt'97, Springer LNCS, vol. 1233, pp. 256-266, 1997) (based on the Cramer-Shoup scheme in CRYPTO'98, Springer LNCS, vol. 1462, pp. 13-25, 1998). Its major practical advantage is that it saves the computation of one exponentiation and produces shorter ciphertexts. This efficiency improvement is the result of a surprising observation: previous hybrid schemes were proven secure by proving that both the KEM and the DEM were CCA2-secure. On the other hand, our KEM is not CCA2-secure, yet the whole scheme is, assuming the Decisional Diffie-Hellman (DDH) Assumption. Finally we generalize our new scheme in two ways: (i) we show that security holds also if we use projective hash families (as the original Cramer-Shoup), and (ii) we show that in the random oracle model we can prove security under the weaker Computational Diffie-Hellman (CDH) Assumption.
引用
收藏
页码:91 / 120
页数:30
相关论文
共 50 条
  • [1] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    [J]. Journal of Cryptology, 2010, 23 : 91 - 120
  • [2] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack
    Joo, Chihong
    Yun, Aaram
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 173 - 192
  • [3] New paradigms for constructing symmetric encryption schemes secure against chosen-ciphertext attack
    Desai, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 394 - 412
  • [4] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [5] Chosen-ciphertext attack secure public key encryption with auxiliary inputs
    Zhang, Zongyang
    Cao, Zhenfu
    Qian, Haifeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1404 - 1411
  • [6] Certificateless threshold cryptosystem secure against chosen-ciphertext attack
    Long, Yu
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2007, 177 (24) : 5620 - 5637
  • [8] A chosen-ciphertext attack against NTRU
    Jaulmes, É
    Joux, A
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 20 - 35
  • [9] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    [J]. PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [10] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +