Amplification of Chosen-Ciphertext Security

被引:0
|
作者
Lin, Huijia [1 ,2 ]
Tessaro, Stefano [2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] MIT, Cambridge, MA 02139 USA
来源
关键词
TRAPDOOR FUNCTIONS; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A central question in the theory of public-key cryptography is to determine which minimal assumptions are sufficient to achieve security against chosen-ciphertext attacks (or CCA-security, for short). Following the large body of work on hardness and correctness amplification, we investigate how far we can weaken CCA security and still be able to efficiently transform any scheme satisfying such a weaker notion into a fully CCA-secure one. More concretely, we consider a weak CCA-secure bit-encryption scheme with decryption error (1 - alpha)/2 where an adversary can distinguish encryptions of different messages with possibly large advantage beta < 1-1/poly. We show that whenever alpha(2) > beta, the weak correctness and security properties can be simultaneously amplified to obtain a fully CCA-secure encryption scheme with negligible decryption error. Our approach relies both on a new hardcore lemma for CCA security as well as on revisiting the recently proposed approach to obtain CCA security due to Hohenberger et al (EUROCRYPT'12). We note that such amplification results were only known in the simpler case of security against chosen-plaintext attacks.
引用
收藏
页码:503 / 519
页数:17
相关论文
共 50 条
  • [1] Relaxing chosen-ciphertext security
    Canetti, R
    Krawczyk, H
    Nielsen, JB
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 565 - 582
  • [2] Combiners for Chosen-Ciphertext Security
    Zhang, Cong
    Cash, David
    Wang, Xiuhua
    Yu, Xiaoqi
    Chow, Sherman S. M.
    [J]. COMPUTING AND COMBINATORICS, COCOON 2016, 2016, 9797 : 257 - 268
  • [3] Enhanced Chosen-Ciphertext Security and Applications
    Dachman-Soled, Dana
    Fuchsbauer, Georg
    Mohassel, Payman
    O'Neill, Adam
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 329 - 344
  • [4] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [5] Chosen-ciphertext security without redundancy
    Phan, DH
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 1 - 18
  • [6] Relaxing Enhanced Chosen-Ciphertext Security
    Dai, Honglong
    Chang, Jinying
    Hou, Zhenduo
    Xu, Maozhi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (12): : 2454 - 2463
  • [7] Chosen-ciphertext security of multiple encryption
    Dodis, Y
    Katz, J
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 188 - 209
  • [8] Adaptive Trapdoor Functions and Chosen-Ciphertext Security
    Kiltz, Eike
    Mohassel, Payman
    O'Neill, Adam
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 673 - +
  • [9] Chosen-Ciphertext Security via Correlated Products
    Rosen, Alon
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 419 - +
  • [10] Chosen-Ciphertext Security from Subset Sum
    Faust, Sebastian
    Masny, Daniel
    Venturi, Daniele
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 35 - 46