Characterization of Security Notions for Probabilistic Private-Key Encryption

被引:0
|
作者
Jonathan Katz
Moti Yung
机构
[1] Department of Computer Science,
[2] University of Maryland,undefined
[3] College Park,undefined
[4] MD 20742,undefined
[5] Department of Computer Science,undefined
[6] Columbia University,undefined
[7] 1214 Amsterdam Avenue,undefined
[8] New York,undefined
[9] NY 10027,undefined
来源
Journal of Cryptology | 2006年 / 19卷
关键词
Private-key encryptions; Definitions;
D O I
暂无
中图分类号
学科分类号
摘要
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption. Extending security notions from the public-key setting, we define security in the sense of both indistinguishability and non-malleability against chosen-plaintext and chosen-ciphertext attacks, considering both non-adaptive (i.e., ``lunchtime'') and adaptive oracle access (adaptive here refers to an adversary's ability to interact with a given oracle even after viewing the challenge ciphertext). We then characterize the 18 resulting security notions in two ways. First, we construct a complete hierarchy of security notions; that is, for every pair of definitions we show whether one definition is stronger than the other, whether the definitions are equivalent, or whether they are incomparable. Second, we partition these notions of security into two classes (computational or information-theoretic) depending on whether one-way functions are necessary in order for encryption schemes satisfying the definition to exist. Perhaps our most surprising result is that security against adaptive chosen-plaintext attack is (polynomially) equivalent to security against non-adaptive chosen-plaintext attack. On the other hand, the ability of an adversary to mount a (non-adaptive) chosen-plaintext attack is the key feature distinguishing computational and information-theoretic notions of security. These results hold for all security notions considered here.
引用
收藏
页码:67 / 95
页数:28
相关论文
共 50 条
  • [41] A new aspect for security notions: Secure randomness in public-key encryption schemes
    Koshiba, T
    [J]. PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 87 - 103
  • [42] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [43] One private-key for all DL-based cryptosystems
    Pon, SF
    Lu, EH
    Jeng, AB
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 666 - 672
  • [44] Probabilistic encryption key exchange
    Moreau, T
    [J]. ELECTRONICS LETTERS, 1995, 31 (25) : 2166 - 2168
  • [45] Accelerating private-key cryptography via multithreading on symmetric multiprocessors
    Dongara, P
    Vijaykumar, TN
    [J]. ISPASS: 2003 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE, 2003, : 58 - 69
  • [46] Secure data encryption key scenario for protecting private data security and privacy
    Mandal, Sanjeev Kumar
    Sharma, Amit
    Henge, Santosh Kumar
    Bashir, Sumaira
    Shukla, Madhuresh
    Pathak, Asim Tara
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 269 - 281
  • [47] Distributed Private-Key Generation Scheme with Self-Certified Identity
    Xie, Yongming
    Wang, Guojun
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 501 - 508
  • [48] Private-key cryptosystem based on burst-error-correcting codes
    Sun, HM
    [J]. ELECTRONICS LETTERS, 1997, 33 (24) : 2035 - 2036
  • [49] Online encryption schemes: New security notions and constructions
    Boldyreva, A
    Taesombut, N
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 1 - 14
  • [50] Removing Escrow from Identity-Based Encryption New Security Notions and Key Management Techniques
    Chow, Sherman S. M.
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 256 - 276