Selective-Opening Security for Public-Key Encryption in the Presence of Parameter Subversion

被引:0
|
作者
Kang B. [1 ,2 ,3 ]
Huang Z. [4 ]
Zhang L. [1 ,2 ,3 ]
机构
[1] Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai
[2] Guangxi Key Laboratory of Cryptography and Information Security, Guangxi, Guilin
[3] Engineering Research Center of Software/Hardware Co-Design Technology and Application, Ministry of Education, East China Normal University, Shanghai
[4] Peng Cheng Laboratory, Shenzhen
关键词
Security of data;
D O I
10.1155/2021/5895809
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In public-key encryption (PKE), ciphertexts received by a receiver may be possibly correlated and the security of a PKE relies on honestly generated system parameters. Security against selective opening attacks (SOA) for PKE guarantees that even when an attacker has broken into a subset of honestly generated ciphertexts and opened them (i.e., seeing plaintexts and random bits), the unopened ciphertexts remain secure. While security against parameter subversion attacks (PSA) for PKE requires that even when the public system parameters are maliciously generated, a PKE scheme should be secure. In this paper, we initiate the study of PKE secure against both SOA and PSA. To capture SOA and PSA simultaneously, we formulate a new security notion called indistinguishability under selective opening attacks and parameter subversion attacks (IND-SO-PSA). Further, we define the lossy trapdoor function and all-but-many lossy trapdoor function in the presence of PSA (LTF-PSA and ABM-LTF-PSA correspondingly) and propose an instantiation with the efficiently-embeddable group (EG). Applying these new primitives, we construct a PKE scheme that is proven to be IND-SO-PSA secure. © 2021 Burong Kang et al.
引用
收藏
相关论文
共 50 条
  • [31] Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
    Bellare, Mihir
    Viet Tung Hoang
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 627 - 656
  • [32] Continuous Leakage-Amplified Public-Key Encryption With CCA Security
    Zhang, Wenzheng
    Qiao, Zirui
    Yang, Bo
    Zhou, Yanwei
    Zhang, Mingwu
    COMPUTER JOURNAL, 2022, 65 (07): : 1760 - 1775
  • [33] Relations between robustness and RKA security under public-key encryption
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    THEORETICAL COMPUTER SCIENCE, 2016, 628 : 78 - 91
  • [34] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [35] Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
    Qin, Baodong
    Cui, Hui
    Zheng, Xiaokun
    Zheng, Dong
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 19 - 38
  • [36] Quantum public-key encryption protocols with information-theoretic security
    Yang, Li
    Yang, Biyao
    Pan, Jiangyou
    QUANTUM OPTICS II, 2012, 8440
  • [37] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [38] Group signature implies public-key encryption with non-interactive opening
    Keita Emura
    Goichiro Hanaoka
    Yusuke Sakai
    Jacob C. N. Schuldt
    International Journal of Information Security, 2014, 13 : 51 - 62
  • [39] Group signature implies public-key encryption with non-interactive opening
    Emura, Keita
    Hanaoka, Goichiro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 51 - 62
  • [40] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227