On the security notions for public-key encryption schemes

被引:0
作者
Phan, DH [1 ]
Pointcheval, D [1 ]
机构
[1] Ecole Normale Super, Dept Informat, F-75230 Paris, France
来源
SECURITY IN COMMUNICATION NETWORKS | 2005年 / 3352卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we revisit the security notions for public-key encryption, and namely indistinguishability. We indeed achieve the surprising result that no decryption query before receiving the challenge ciphertext can be replaced by queries (whatever the number is) after having received the challenge, and vice-versa. This remark leads to a stricter and more complex hierarchy for security notions in the public-key setting: the (i,j)-IND level, in which an adversary can ask at most i (j resp.) queries before (after resp.) receiving the challenge. Excepted the trivial implications, all the other relations are strict gaps, with no polynomial reduction (under the assumption that IND-CCA2 secure encryption schemes exist.) Similarly, we define different levels for non-malleability (denoted (i,j)-NM.)
引用
收藏
页码:33 / 46
页数:14
相关论文
共 16 条
  • [1] [Anonymous], LECT NOTES COMPUT SC
  • [2] Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
  • [3] Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
  • [4] BELLARE M, 1997, P 38 FOCS IEEE NEW Y
  • [5] Nonmalleable cryptography
    Dolev, D
    Dwork, C
    Naor, M
    [J]. SIAM JOURNAL ON COMPUTING, 2000, 30 (02) : 391 - 437
  • [6] Dolev D., 1991, P 23 STOC
  • [7] GOLDREICH O, 1986, J ACM, V33, P210
  • [8] A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS
    GOLDWASSER, S
    MICALI, S
    RIVEST, RL
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 281 - 308
  • [9] PROBABILISTIC ENCRYPTION
    GOLDWASSER, S
    MICALI, S
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299
  • [10] Goldwasser S, 1985, P 17 ANN ACM S THEOR, P291, DOI [DOI 10.1145/22145.22178, 10.1145/22145, DOI 10.1145/22145]