Selective-Opening Security for Public-Key Encryption in the Presence of Parameter Subversion

被引:0
|
作者
Kang B. [1 ,2 ,3 ]
Huang Z. [4 ]
Zhang L. [1 ,2 ,3 ]
机构
[1] Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai
[2] Guangxi Key Laboratory of Cryptography and Information Security, Guangxi, Guilin
[3] Engineering Research Center of Software/Hardware Co-Design Technology and Application, Ministry of Education, East China Normal University, Shanghai
[4] Peng Cheng Laboratory, Shenzhen
关键词
Security of data;
D O I
10.1155/2021/5895809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In public-key encryption (PKE), ciphertexts received by a receiver may be possibly correlated and the security of a PKE relies on honestly generated system parameters. Security against selective opening attacks (SOA) for PKE guarantees that even when an attacker has broken into a subset of honestly generated ciphertexts and opened them (i.e., seeing plaintexts and random bits), the unopened ciphertexts remain secure. While security against parameter subversion attacks (PSA) for PKE requires that even when the public system parameters are maliciously generated, a PKE scheme should be secure. In this paper, we initiate the study of PKE secure against both SOA and PSA. To capture SOA and PSA simultaneously, we formulate a new security notion called indistinguishability under selective opening attacks and parameter subversion attacks (IND-SO-PSA). Further, we define the lossy trapdoor function and all-but-many lossy trapdoor function in the presence of PSA (LTF-PSA and ABM-LTF-PSA correspondingly) and propose an instantiation with the efficiently-embeddable group (EG). Applying these new primitives, we construct a PKE scheme that is proven to be IND-SO-PSA secure. © 2021 Burong Kang et al.
引用
收藏
相关论文
共 50 条
  • [1] Public-Key Encryption with Tight Simulation-Based Selective-Opening Security
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    COMPUTER JOURNAL, 2018, 61 (02): : 288 - 318
  • [2] Public-Key Encryption with Simulation-Based Sender Selective-Opening Security
    Zhu, Dali
    Zhang, Renjun
    Jia, Dingding
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 361 - 380
  • [3] Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
    Hofheinz, Dennis
    Jager, Tibor
    Rupp, Andy
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 146 - 168
  • [4] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [5] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [6] On the Selective Opening Security of Practical Public-Key Encryption Schemes
    Heuer, Felix
    Jager, Tibor
    Kiltz, Eike
    Schaege, Sven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 27 - 51
  • [7] Selective-Opening Security in the Presence of Randomness Failures
    Viet Tung Hoang
    Katz, Jonathan
    O'Neill, Adam
    Zaheri, Mohammad
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 278 - 306
  • [8] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [9] Practical public key encryption with selective opening security for receivers
    Huang, Zhengan
    Lai, Junzuo
    Chen, Wenbin
    Raees-ul-Haq, Muhammad
    Jiang, Liaoliang
    INFORMATION SCIENCES, 2019, 478 : 15 - 27
  • [10] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46