Towards tightly secure deterministic public key encryption

In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove th...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Daode, LI, Bao, LIU, Yamin, XUE, Haiyang, LU, Xianhui, JIA, Dingding
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9205
https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10210
record_format dspace
spelling sg-smu-ink.sis_research-102102024-08-13T05:05:16Z Towards tightly secure deterministic public key encryption ZHANG, Daode LI, Bao LIU, Yamin XUE, Haiyang LU, Xianhui JIA, Dingding In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc∗) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND-n2-CCA secure (i.e., the number of challenge ciphertexts nc∗ is bounded by n2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND-n2-CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND-n2-CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption. 2017-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9205 info:doi/10.1007/978-3-319-89500-0_13 https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Deterministic public key encryption Tight security reduction Lossy trapdoor functions Standard model Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Deterministic public key encryption
Tight security reduction
Lossy trapdoor functions
Standard model
Information Security
spellingShingle Deterministic public key encryption
Tight security reduction
Lossy trapdoor functions
Standard model
Information Security
ZHANG, Daode
LI, Bao
LIU, Yamin
XUE, Haiyang
LU, Xianhui
JIA, Dingding
Towards tightly secure deterministic public key encryption
description In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc∗) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND-n2-CCA secure (i.e., the number of challenge ciphertexts nc∗ is bounded by n2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND-n2-CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND-n2-CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption.
format text
author ZHANG, Daode
LI, Bao
LIU, Yamin
XUE, Haiyang
LU, Xianhui
JIA, Dingding
author_facet ZHANG, Daode
LI, Bao
LIU, Yamin
XUE, Haiyang
LU, Xianhui
JIA, Dingding
author_sort ZHANG, Daode
title Towards tightly secure deterministic public key encryption
title_short Towards tightly secure deterministic public key encryption
title_full Towards tightly secure deterministic public key encryption
title_fullStr Towards tightly secure deterministic public key encryption
title_full_unstemmed Towards tightly secure deterministic public key encryption
title_sort towards tightly secure deterministic public key encryption
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/9205
https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf
_version_ 1814047790693613568