Adaptive Witness Encryption and Asymmetric Password-Based Cryptography

被引:17
作者
Bellare, Mihir [1 ]
Viet Tung Hoang [2 ,3 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA 92103 USA
[2] Georgetown Univ, Dept Comp Sci, Washington, DC USA
[3] Univ Maryland, Dept Comp Sci, Washington, DC USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015 | 2015年 / 9020卷
关键词
SECURITY;
D O I
10.1007/978-3-662-46447-2_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters (STOC 2013) does not suffice for the security of their own applications. We introduce adaptively-sound (AS) witness encryption to fill the gap. We then introduce asymmetric password-based encryption (APBE). This offers gains over classical, symmetric password-based encryption in the face of attacks that compromise servers to recover hashed passwords. We distinguish between invasive A-PBE schemes (they introduce new password-based key-derivation functions) and non-invasive ones (they can use existing, deployed password-based key-derivation functions). We give simple and efficient invasive A-PBE schemes and use AS-secure witness encryption to give non-invasive A-PBE schemes.
引用
收藏
页码:308 / 331
页数:24
相关论文
共 36 条
[31]  
Komargodski I, 2014, LECT NOTES COMPUT SC, V8874, P254, DOI 10.1007/978-3-662-45608-8_14
[32]   Randomness is linear in space [J].
Nisan, N ;
Zuckerman, D .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1996, 52 (01) :43-52
[33]  
Provos N., 1999, Proceedings of the FREENIX Track. 1999 USENIX Annual Technical Conference, P81
[34]  
Rosen A, 2009, LECT NOTES COMPUT SC, V5444, P419
[35]   How to Use Indistinguishability Obfuscation: Deniable Encryption, and More [J].
Sahai, Amit ;
Waters, Brent .
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, :475-484
[36]  
Yao A. C., 1982, IEEE 23 S FDN COMP S, P80