Adaptive Witness Encryption and Asymmetric Password-Based Cryptography

被引:17
作者
Bellare, Mihir [1 ]
Viet Tung Hoang [2 ,3 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA 92103 USA
[2] Georgetown Univ, Dept Comp Sci, Washington, DC USA
[3] Univ Maryland, Dept Comp Sci, Washington, DC USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015 | 2015年 / 9020卷
关键词
SECURITY;
D O I
10.1007/978-3-662-46447-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the security of their own applications. We introduce adaptively-sound (AS) witness encryption to fill the gap. We then introduce asymmetric password-based encryption (APBE). This offers gains over classical, symmetric password-based encryption in the face of attacks that compromise servers to recover hashed passwords. We distinguish between invasive A-PBE schemes (they introduce new password-based key-derivation functions) and non-invasive ones (they can use existing, deployed password-based key-derivation functions). We give simple and efficient invasive A-PBE schemes and use AS-secure witness encryption to give non-invasive A-PBE schemes.
引用
收藏
页码:308 / 331
页数:24
相关论文
共 36 条
[1]   Optimizing Obfuscation: Avoiding Barrington's Theorem [J].
Ananth, Prabhanjan ;
Gupta, Divya ;
Lshai, Yuval ;
Sahai, Amit .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :646-658
[2]  
Ananth Prabhanjan, 2013, IACR Cryptol. ePrint Arch., P689
[3]  
[Anonymous], 2000, PKCS 5 PASS BAS CRYP
[4]  
[Anonymous], 2013703 CRYPT EPRINT
[5]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[6]  
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[7]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[8]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[9]  
Bellare M., 2013, 2013704 CRYPT EPRINT
[10]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409