Anamorphic Encryption, Revisited

被引:3
作者
Banfi, Fabio [1 ]
Gegier, Konstantin [2 ]
Hirt, Martin [2 ]
Maurer, Ueli [2 ]
Rito, Guilherme [3 ]
机构
[1] Zuhlke Engn AG, Schlieren, Switzerland
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[3] Ruhr Univ Bochum, Bochum, Germany
来源
ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024 | 2024年 / 14652卷
关键词
anamorphic encryption; dictator model; robustness; selective randomness recoverability; PUBLIC-KEY CRYPTOSYSTEM; SECURITY; ATTACKS;
D O I
10.1007/978-3-031-58723-8_1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An anamorphic encryption scheme allows two parties who share a so-called double key to embed covert messages in ciphertexts of an established PKE scheme. This protects against a dictator that can force the receiver to reveal the secret keys for the PKE scheme, but who is oblivious about the existence of the double key. We identify two limitations of the original model by Persiano, Phan, and Yung (EUROCRYPT 2022). First, in their definition a double key can only be generated once, together with a key-pair. This has the drawback that a receiver who wants to use the anamorphic mode after a dictator comes to power, needs to deploy a new key-pair, a potentially suspicious act. Second, a receiver cannot distinguish whether or not a ciphertext contains a covert message. In this work we propose a new model that overcomes these limitations. First, we allow to associate multiple double keys to a key-pair, after its deployment. This also enables deniability in case the double key only depends on the public key. Second, we propose a natural robustness notion, which guarantees that anamorphically decrypting a regularly encrypted message results in a special symbol indicating that no covert message is contained, which also eliminates certain attacks. Finally, to instantiate our new, stronger definition of anamorphic encryption, we provide generic and concrete constructions. Concretely, we show that ElGamal and Cramer-Shoup satisfy a new condition, selective randomness recoverability, which enables robust anamorphic extensions, and we also provide a robust anamorphic extension for RSA-OAEP.
引用
收藏
页码:3 / 32
页数:30
相关论文
共 37 条
  • [1] Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
  • [2] Abelson H., 2015, KEYS DOORMATS MANDAT
  • [3] Abelson H., 1997, The risks of key recovery, key escrow, and trusted third-party encryption
  • [4] Banfi F., 2023, Report 2023/249
  • [5] A concrete security treatment of symmetric encryption
    Bellare, M
    Desai, A
    Jokipii, E
    Rogaway, P
    [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 394 - 403
  • [6] Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P341
  • [7] Bellare M., 1995, LNCS, V950, P92, DOI DOI 10.1007/BFB0053428
  • [8] Bellare M., 2001, LNCS, V2248, P566, DOI DOI 10.1007/3-540-45682-1
  • [9] Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
  • [10] Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1