New technique for chosen-ciphertext security based on non-interactive zero-knowledge

被引:3
作者
Seo, Minhye [1 ]
Abdalla, Michel [2 ,3 ]
Lee, Dong Hoon [1 ]
Park, Jong Hwan [4 ]
机构
[1] Korea Univ, Seoul, South Korea
[2] PSL Univ, CNRS, Ecole Normale Super, DIENS, Paris, France
[3] INRIA, Paris, France
[4] Sangmyung Univ, Seoul, South Korea
关键词
Chosen-ciphertext security; NIZK; Random oracle model; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; SCHEMES;
D O I
10.1016/j.ins.2019.03.063
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we propose a new method for conversion from a one-way (OW)-secure key encapsulation mechanism (KEM) into a chosen-ciphertext (CCA) secure KEM in the random oracle model. Our conversion method is based on the non-interactive zero-knowledge (NIZK) proof system for proving the relationships (e.g., equality or linearity) of discrete logarithms, where the security analysis of our conversion method depends on the NIZK properties of soundness and zero-knowledge. Our conversion method achieves tight security reduction and it is semi-generic in the sense that other than OW-security, a KEM should be NIZK-compatible. From a theoretical viewpoint, our conversion method can be considered as the corresponding approach for obtaining an efficient signature by applying the Fiat-Shamir transform to the NIZK system. We applied our conversion method to several OW-secure (identity-based) KEMs and compared the results with those obtained by previous methods for achieving CCA security. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:18 / 35
页数:18
相关论文
共 34 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[3]  
Benson Karyn, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P310, DOI 10.1007/978-3-642-36095-4_20
[4]   On the Hardness of Proving CCA-Security of Signed ElGamal [J].
Bernhard, David ;
Fischlin, Marc ;
Warinschi, Bogdan .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 :47-69
[5]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]   Efficient Selective Identity-Based Encryption Without Random Oracles [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2011, 24 (04) :659-693
[9]  
Boyen X., 2005, Proc. 12th ACM Conference on Computer and Communications Security (CCS), P320
[10]  
Camenisch J., 1997, Technical Report, P260