Amplification of Chosen-Ciphertext Security

被引:0
|
作者
Lin, Huijia [1 ,2 ]
Tessaro, Stefano [2 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] MIT, Cambridge, MA 02139 USA
来源
关键词
TRAPDOOR FUNCTIONS; ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A central question in the theory of public-key cryptography is to determine which minimal assumptions are sufficient to achieve security against chosen-ciphertext attacks (or CCA-security, for short). Following the large body of work on hardness and correctness amplification, we investigate how far we can weaken CCA security and still be able to efficiently transform any scheme satisfying such a weaker notion into a fully CCA-secure one. More concretely, we consider a weak CCA-secure bit-encryption scheme with decryption error (1 - alpha)/2 where an adversary can distinguish encryptions of different messages with possibly large advantage beta < 1-1/poly. We show that whenever alpha(2) > beta, the weak correctness and security properties can be simultaneously amplified to obtain a fully CCA-secure encryption scheme with negligible decryption error. Our approach relies both on a new hardcore lemma for CCA security as well as on revisiting the recently proposed approach to obtain CCA security due to Hohenberger et al (EUROCRYPT'12). We note that such amplification results were only known in the simpler case of security against chosen-plaintext attacks.
引用
收藏
页码:503 / 519
页数:17
相关论文
共 50 条
  • [41] Simulation-based selective opening security for receivers under chosen-ciphertext attacks
    Huang, Zhengan
    Lai, Junzuo
    Chen, Wenbin
    Au, Man Ho
    Peng, Zhen
    Li, Jin
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (06) : 1345 - 1371
  • [42] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 (809) : 277 - 295
  • [43] FORWARD -SECURE IDENTITY -BASED ENCRYPTION WITH DIRECT CHOSEN-CIPHERTEXT SECURITY IN THE STANDARD MODEL
    Lu, Yang
    Li, Jiguo
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2017, 11 (01) : 161 - 177
  • [44] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [45] Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding
    Zhou, Jiantao
    Au, Oscar C.
    Wong, Peter Hon-Wah
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (05) : 1825 - 1838
  • [46] Chosen-Ciphertext Secure RSA-Type Cryptosystems
    Chevallier-Mames, Benoit
    Joye, Marc
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 32 - +
  • [47] Chosen Ciphertext Security with Optimal Ciphertext Overhead
    Abe, Masayuki
    Kiltz, Eike
    Okamoto, Tatsuaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 22 - 33
  • [48] New technique for chosen-ciphertext security based on non-interactive zero-knowledge
    Seo, Minhye
    Abdalla, Michel
    Lee, Dong Hoon
    Park, Jong Hwan
    [J]. INFORMATION SCIENCES, 2019, 490 : 18 - 35
  • [49] Trading one-wayness against chosen-ciphertext security in factoring-based encryption
    Paillier, Pascal
    Villar, Jorge L.
    [J]. Advances in Cryptology - ASIACRYPT 2006, 2006, 4284 : 252 - 266
  • [50] Chosen Ciphertext Security with Optimal Ciphertext Overhead
    Abe, Masayuki
    Kiltz, Eike
    Okamoto, Tatsuaki
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 355 - 371