Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing

被引:0
作者
Qin, Baodong [1 ]
Liu, Shengli [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2014 | 2014年 / 8383卷
关键词
Public-key encryption; leakage flexibility; chosen-ciphertext security; RESILIENT; CRYPTOGRAPHY; PARADIGM;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In AsiaCrypt 2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption (PKE) in the presence of bounded key-leakage, from any universal hash proof system (due to Cramer and Shoup) and any one-time lossy filter (a simplified version of lossy algebraic filters, due to Hofheinz). They presented two instantiations under the DDH and DCR assumptions, which result in leakage rate (defined as the ratio of leakage amount to the secret-key length) of 1/2 - o(1). In this paper, we extend their work to broader assumptions and to flexible leakage rate, more specifically to leakage rate of 1 - o(1). -We introduce the Refined Subgroup Indistinguishability (RSI) assumption, which is a subclass of subgroup indistinguishability assumptions, including many standard number-theoretical assumptions, like the quadratic residuosity assumption, the decisional composite residuosity assumption and the subgroup decision assumption over a group of known order defined by Boneh et al. -We show that universal hash proof (UHP) system and one-time lossy filter (OT-LF) can be simply and efficiently constructed from the RSI assumption. Applying Qin and Liu's paradigm gives simple and efficient PKE schemes under the RSI assumption. -With the RSI assumption over a specific group (free of pairing), public parameters of UHP and OT-LF can be chosen in a flexible way, resulting in a leakage-flexible CCA-secure PKE scheme. More specifically, we get the first CCA-secure PKE with leakage rate of 1 - o(1) without pairing.
引用
收藏
页码:19 / 36
页数:18
相关论文
共 33 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]  
[Anonymous], NDSS 2000 INT SOC
[4]  
Boneh D, 2008, LECT NOTES COMPUT SC, V5157, P108, DOI 10.1007/978-3-540-85174-5_7
[5]   Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage [J].
Brakerski, Zvika ;
Kalai, Yael Tauman ;
Katz, Jonathan ;
Vaikuntanathan, Vinod .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :501-510
[6]  
Brakerski Z, 2010, LECT NOTES COMPUT SC, V6223, P1, DOI 10.1007/978-3-642-14623-7_1
[7]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[8]   Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions [J].
Chow, Sherman S. M. ;
Dodis, Yevgeniy ;
Rouselakis, Yannis ;
Waters, Brent .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :152-161
[9]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
[10]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139