Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption

被引:0
|
作者
Sun, Shi-Feng [1 ]
Gu, Dawu [1 ]
Liu, Joseph K. [2 ]
Parampalli, Udaya [3 ]
Yuen, Tsz Hon [4 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] Monash Univ, Clayton, Vic 3800, Australia
[3] Univ Melbourne, Melbourne, Vic 3010, Australia
[4] Huawei, Singapore, Singapore
来源
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Public Key encryption; Complete non-malleability; Chosen-ciphertext attack; Standard model;
D O I
10.1145/2897845.2897921
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-malleability is an important and intensively studied security notion for many cryptographic primitives. In the context of public key encryption, this notion means it is infeasible for an adversary to transform an encryption of some message m into one of a related message m' under the given public key. Although it has provided a strong security property for many applications, it still does not suffice for some scenarios like the system where the users could issue keys on-the-fly. In such settings, the adversary may have the power to transform the given public key and the ciphertext. To withstand such attacks, Fischlin introduced a stronger notion, known as complete non-malleability, which requires that the non-malleability property be preserved even for the adversaries attempting to produce a ciphertext of some related message under the transformed public key. To date, many schemes satisfying this stronger security have been proposed, but they are either inefficient or proved secure in the random oracle model. In this work, we put forward a new encryption scheme in the common reference string model. Based on the standard DBDH assumption, the proposed scheme is proved completely non-malleable secure against adaptive chosen ciphertext attacks in the standard model. In our scheme, the well-formed public keys and ciphertexts could be publicly recognized without drawing support from unwieldy techniques like non-interactive zero knowledge proofs or one-time signatures, thus achieving a better performance.
引用
收藏
页码:901 / 906
页数:6
相关论文
共 50 条
  • [1] Efficient Completely Non-malleable Public Key Encryption
    Libert, Benoit
    Yung, Moti
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT I, 2010, 6198 : 127 - +
  • [2] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 1 - +
  • [3] Completely non-malleable encryption revisited
    Ventre, Carmine
    Visconti, Ivan
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 65 - 84
  • [4] Non-malleable Multiple Public-Key Encryption
    Fujioka, Atsushi
    Fujisaki, Eiichiro
    Xagawa, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06): : 1318 - 1334
  • [5] Lattice-based completely non-malleable public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    Designs, Codes and Cryptography, 2014, 71 : 293 - 313
  • [6] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313
  • [7] A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption
    Seung Geol Choi
    Dana Dachman-Soled
    Tal Malkin
    Hoeteck Wee
    Journal of Cryptology, 2018, 31 : 172 - 201
  • [8] A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 172 - 201
  • [9] Construction of a non-malleable encryption scheme from any semantically secure one
    Pass, Rafael
    shelat, abhi
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 271 - 289
  • [10] Completely non-malleable schemes
    Fischlin, M
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 779 - 790