Towards tightly secure deterministic public key encryption
In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove th...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9205 https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10210 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-102102024-08-13T05:05:16Z Towards tightly secure deterministic public key encryption ZHANG, Daode LI, Bao LIU, Yamin XUE, Haiyang LU, Xianhui JIA, Dingding In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc∗) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND-n2-CCA secure (i.e., the number of challenge ciphertexts nc∗ is bounded by n2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND-n2-CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND-n2-CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption. 2017-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9205 info:doi/10.1007/978-3-319-89500-0_13 https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Deterministic public key encryption Tight security reduction Lossy trapdoor functions Standard model Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Deterministic public key encryption Tight security reduction Lossy trapdoor functions Standard model Information Security |
spellingShingle |
Deterministic public key encryption Tight security reduction Lossy trapdoor functions Standard model Information Security ZHANG, Daode LI, Bao LIU, Yamin XUE, Haiyang LU, Xianhui JIA, Dingding Towards tightly secure deterministic public key encryption |
description |
In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumptions and also analyze the tightness of generic D-PKE constructions. Furthermore, we prove that the CPA secure D-PKE scheme of Boldyreva et al. (Crypto’08) is tightly PRIV-IND-CPA secure for block-sources. Our security reduction improves the security loss of their scheme from O(nc∗) to O(1). Additionally, by upgrading the all-but-one trapdoor function (TDF) in the construction of Boldyreva et al. to all-but-n TDF defined by Hemenway et al. (Asiacrypt’11), we give general construction of PRIV-IND-n2-CCA secure (i.e., the number of challenge ciphertexts nc∗ is bounded by n2) D-PKE scheme for block-sources. And we observe that if the security reduction of the all-but-n TDF is tight, the D-PKE scheme can be tightly PRIV-IND-n2-CCA secure. Finally, we prove that the all-but-n TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND-n2-CCA secure D-PKE scheme for block-sources, based on the s-DCR assumption. |
format |
text |
author |
ZHANG, Daode LI, Bao LIU, Yamin XUE, Haiyang LU, Xianhui JIA, Dingding |
author_facet |
ZHANG, Daode LI, Bao LIU, Yamin XUE, Haiyang LU, Xianhui JIA, Dingding |
author_sort |
ZHANG, Daode |
title |
Towards tightly secure deterministic public key encryption |
title_short |
Towards tightly secure deterministic public key encryption |
title_full |
Towards tightly secure deterministic public key encryption |
title_fullStr |
Towards tightly secure deterministic public key encryption |
title_full_unstemmed |
Towards tightly secure deterministic public key encryption |
title_sort |
towards tightly secure deterministic public key encryption |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/9205 https://ink.library.smu.edu.sg/context/sis_research/article/10210/viewcontent/towards_tightly.pdf |
_version_ |
1814047790693613568 |