CCA Updatable Encryption Against Malicious Re-encryption Attacks

被引:16
作者
Chen, Long [1 ]
Li, Yanan [1 ]
Tang, Qiang [1 ]
机构
[1] New Jersey Inst Technol, Newark, NJ 07102 USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT III | 2020年 / 12493卷
关键词
SECURE;
D O I
10.1007/978-3-030-64840-4_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Updatable encryption (UE) is an attractive primitive, which allows the secret key of the outsourced encrypted data to be updated to a fresh one periodically. Several elegant works exist studying various security properties. We notice several major issues in existing security models of (ciphertext dependent) updatable encryption, in particular, integrity and CCA security. The adversary in the models is only allowed to request the server to re-encrypt honestly generated ciphertext, while in practice, an attacker could try to inject arbitrary ciphertexts into the server as she wishes. Those malformed ciphertext could be updated and leveraged by the adversary and cause serious security issues. In this paper, we fill the gap and strengthen the security definitions in multiple aspects: most importantly our integrity and CCA security models remove the restriction in previous models and achieve standard notions of integrity and CCA security in the setting of updatable encryption. Along the way, we refine the security model to capture post-compromise security and enhance the re-encryption indistinguishability to the CCA style. Guided by the new models, we provide a novel construction ReCrypt(+), which satisfies our strengthened security definitions. The technical building block of homomorphic hash from a group may be of independent interests. We also study the relations among security notions; and a bit surprisingly, the folklore result in authenticated encryption that IND-CPA plus ciphertext integrity imply IND-CCA security does not hold for ciphertext dependent updatable encryption.
引用
收藏
页码:590 / 620
页数:31
相关论文
共 22 条
[1]   Authenticated encryption: Relations among notions and analysis of the generic composition paradigm [J].
Bellare, Mihir ;
Namprempre, Chanathip .
JOURNAL OF CRYPTOLOGY, 2008, 21 (04) :469-491
[2]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[3]  
Boneh D., 2020, Tech. Rep. 2020/081
[4]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[5]   Fast and Secure Updatable Encryption [J].
Boyd, Colin ;
Davies, Gareth T. ;
Gjosteen, Kristian ;
Jiang, Yao .
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 :464-493
[6]  
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[7]  
Chaum D., 1992, LNCS, V576, P470, DOI [10.1007/3-540-46766-138, DOI 10.1007/3-540-46766-138]
[8]  
Chen L., 2020, Report 2020/XXX
[9]   Key Rotation for Authenticated Encryption [J].
Everspaugh, Adam ;
Paterson, Kenneth ;
Ristenpart, Thomas ;
Scott, Sam .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 :98-129
[10]  
Gennaro R, 2010, LECT NOTES COMPUT SC, V6056, P142