Disavowable Public Key Encryption with Non-Interactive Opening

被引:1
作者
Ishida, Ai [1 ,2 ]
Emura, Keita [3 ]
Hanaoka, Goichiro [2 ]
Sakai, Yusuke [2 ]
Tanaka, Keisuke [1 ,4 ]
机构
[1] Tokyo Instutitute Technol, Dept Math & Comp Sci, Tokyo 1528552, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
[3] Natl Inst Informat & Commun Technol, Koganei, Tokyo 1848795, Japan
[4] CREST, JST, Tokyo 1528552, Japan
关键词
public key encryption with non-interactive opening; disavowability; non-interactive zero-knowledge proof; SCHEME; PROOFS; SECURE;
D O I
10.1587/transfun.E98.A.2446
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The primitive called public key encryption with non-interactive opening (PKENO) is a class of public key encryption (PKE) with additional functionality. By using this, a receiver of a ciphertext can prove that the ciphertext is an encryption of a specified message in a publicly verifiable manner. In some situation that a receiver needs to claim that a ciphertext is NOT decrypted to a specified message, if he/she proves the fact by using PKENO straightforwardly, the real message of the ciphertext is revealed and a verifier checks that it is different from the specified message about which the receiver wants to prove. However, this naive solution is problematic in terms of privacy. Inspired by this problem, we propose the notion of disavowable public key encryption with non-interactive opening (disavowable PKENO) where, with respect to a ciphertext and a message, the receiver of the ciphertext can issue a proof that the plaintext of the ciphertext is NOT the message. Also, we give a concrete construction. Specifically, a disavowal proof in our scheme consists of 61 group elements. The proposed disavowable PKENO scheme is provably secure in the standard model under the decisional linear assumption and strong unforgeability of the underlying one-time signature scheme.
引用
收藏
页码:2446 / 2455
页数:10
相关论文
共 23 条
  • [1] Blazy Olivier, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P145, DOI 10.1007/978-3-319-16715-2_8
  • [2] Blum M, 1988, P 20 ANN ACM S THEOR, P103, DOI [DOI 10.1145/62212.62222, 10.1145/62212.62222]
  • [3] Short group signatures
    Boneh, D
    Boyen, X
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 41 - 55
  • [4] Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P90
  • [5] Dachman-Soled D, 2014, LECT NOTES COMPUT SC, V8383, P329, DOI 10.1007/978-3-642-54631-0_19
  • [6] Damgård I, 2008, LECT NOTES COMPUT SC, V4964, P239, DOI 10.1007/978-3-540-79263-5_15
  • [7] Damgård I, 2007, LECT NOTES COMPUT SC, V4515, P412
  • [8] Group signature implies public-key encryption with non-interactive opening
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 51 - 62
  • [9] Aspects of Pairing Inversion
    Galbraith, S.
    Hess, F.
    Vercauteren, F.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (12) : 5719 - 5728
  • [10] Galindo D, 2010, LECT NOTES COMPUT SC, V6055, P333