Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

被引:0
|
作者
Han, Shuai [1 ,2 ]
Liu, Shengli [1 ,2 ,3 ]
Lyu, Lin [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2017/2148534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
KDM[F]-CCA security of public-key encryption (PKE) ensures the privacy of key-dependent messages.. (sk) which are closely related to the secret key sk, where f is an element of F, even if the adversary is allowed to make decryption queries. In this paper, we study the design of KDM-CCA secure PKE. To this end, we develop a new primitive named Auxiliary-Input Authenticated Encryption (AIAE). For AIAE, we introduce two related-key attack (RKA) security notions, including IND-RKA and weak-INT-RKA. We present a generic construction of AIAE from tag-based hash proof system (HPS) and one-time secure authenticated encryption (AE) and give an instantiation of AIAE under the Decisional Diffie-Hellman (DDH) assumption. Using AIAE as an essential building block, we give two constructions of efficient KDM-CCA secure PKE based on the DDH and the Decisional Composite Residuosity (DCR) assumptions. Specifically, (i) our first PKE construction is the first one achieving KDM[F-aff]-CCA security for the set of affine functions and compactness of ciphertexts simultaneously. (ii) Our second PKE construction is the first one achieving KDM[F-poly(d)]-CCA security for the set of polynomial functions and almost compactness of ciphertexts simultaneously. Our PKE constructions are very efficient; in particular, they are pairing-free and NIZK-free.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 307 - 338
  • [2] Simple and Efficient KDM-CCA Secure Public Key Encryption
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Tanaka, Keisuke
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 97 - 127
  • [3] KDM-CCA Security from RKA Secure Authenticated Encryption
    Lu, Xianhui
    Li, Bao
    Jia, Dingding
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 559 - 583
  • [4] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Zvika Brakerski
    Gil Segev
    Journal of Cryptology, 2014, 27 : 210 - 247
  • [5] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Brakerski, Zvika
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 543 - 560
  • [6] Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
    Brakerski, Zvika
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2014, 27 (02) : 210 - 247
  • [7] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [8] Efficient public-key authenticated deniable encryption schemes
    Cao, Yanmei
    Wei, Jianghong
    Zhang, Fangguo
    Xiang, Yang
    Chen, Xiaofeng
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [9] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [10] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462