




版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
1、 Probabilistic Public Key Encryption with Equality Test 129 without any help from the message owners. These schemes may also be useful in other similar applications such as collection and categorization of condential data through an agent. 5 Weak IND-CCA2 vs Ciphertext Comparability In Sec. 2, we ha
2、ve shown that ciphertext comparability and indistinguishability are irreconcilable. In this section, we are interested in the following question: if we dont need ciphertext comparability, or when being implemented in a nonbilinear group, what kind of security level can our PKE scheme in Sec. 3 achie
3、ve? The rst security model wed like to try is of course IND-CCA. Unfortunately, our scheme is even not IND-CPA secure, as shown below. Theorem 5. The PKE scheme in Sec. 3 with message space G 1 is not IND-CPA secure. Proof. We construct a PPT adversary A as follows. Given public key y , A computes m
4、0 = g r0 and m1 = g r1 for any two distinct r0 and r1 chosen arbitrarily from Z q . A sends (m0 , m1 to the game simulator. After receiving the challenge ciphertext c = (U, V, W , A checks if V = U r0 . If yes, A returns 0; otherwise A returns 1. The probability that A guesses correctly the value of
5、 b is 1. The above attack demonstrates the advantage the adversary can get from selecting the challenge plaintexts. In the next, we dene a dierent set of indistinguishability games where the adversary has no such power. Denition 3 (W-IND-ATK. Let = (G , E , D be a public key encryption scheme and le
6、t A = (A1 , A2 be a polynomial-time adversary. For atk cpa, cca1, cca2 and k N let 1 (pk, sk G (1k , AO 1 (pk , def windatk 1 = Pr (x0 , x1 PtSp(k , b 0, 1, y E (pk, xb , AdvA , 2 2 b AO 2 (pk, x0 , x1 , , y : b = b where x0 = x1 |x0 | = |x1 | and If atk = cpa then O1 ( = and O2 ( = If atk = cca1 th
7、en O1 ( = Dsk ( and O2 ( = If atk = cca2 then O1 ( = Dsk ( and O2 ( = Dsk ( In the case of CCA2, we insist that A2 does not ask its oracle for decrypting windatk is y . We say that is secure in the sense of W-IND-ATK if AdvA , negligible for any A. W-IND-CCA2 Security of Our PKE. Interestingly, we c
8、an show that when being implemented in a non-bilinear group, our PKE scheme given in Sec. 3 can achieve W-IND-CCA2 security under the DDH assumption which is described below. 130 G. Yang et al. Decisional Die-Hellman (DDH Problem. Fix a generator g of G1 . The DDH assumption claims that g, g a, g b
9、, Z and g, g a , g b , g ab are computationally indistinguishable where a, b are randomly selected from Zq and Z is a random element of G1 . Theorem 6. The PKE scheme in Sec. 3 with message space G 1 is W-IND-CCA2 secure in the random oracle model under the DDH assumption. The proof is by contradict
10、ion. Suppose there exists an adversary who can break the encryption scheme, we plant the DDH problem (g, m, U = g r , V = Z into the challenge ciphertext to the adversary, and simulate the decryption oracle in a similar way as in the proof of Theorem 3. Then depending on Z = mr (i.e. Z is in the “ri
11、ght” form or Z G1 (Z is independent of m, the adversary would have dierent probability in winning the game, so we can use the adversary to solve the DDH problem. The detailed proof is deferred to the full version of the paper. Acknowledgement. We would like to thank the anonymous reviewers for their
12、 comments and suggestions. References 1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptology 21(3, 350391 (2008 2.
13、Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In: Cramer, R. (ed. EUROCRYPT 2005. LNCS, vol. 3494, pp. 128146. Springer, Heidelberg (2005 3. Bellare, M., Boldyreva, A., ONeill, A.: Deterministic and ecien
14、tly searchable encryption. In: Menezes, A. (ed. CRYPTO 2007. LNCS, vol. 4622, pp. 535552. Springer, Heidelberg (2007 4. Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed. CRYPTO 1998. LNCS, vol. 1462, pp.
15、 2645. Springer, Heidelberg (1998 5. Bellare, M., Fischlin, M., ONeill, A., Ristenpart, T.: Deterministic encryption: Denitional equivalences and constructions without random oracles. In: Wagner, D. (ed. CRYPTO 2008. LNCS, vol. 5157, pp. 360378. Springer, Heidelberg (2008 6. Boldyreva, A., Fehr, S.,
16、 ONeill, A.: On notions of security for deterministic encryption, and ecient constructions without random oracles. In: Wagner, D. (ed. CRYPTO 2008. LNCS, vol. 5157, pp. 335359. Springer, Heidelberg (2008 7. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword s
17、earch. In: Cachin, C., Camenisch, J.L. (eds. EUROCRYPT 2004. LNCS, vol. 3027, pp. 506522. Springer, Heidelberg (2004 8. Camenisch, J., Shoup, V.: Practical veriable encryption and decryption of discrete logarithms. In: Boneh, D. (ed. CRYPTO 2003. LNCS, vol. 2729, pp. 126144. Springer, Heidelberg (20
18、03 Probabilistic Public Key Encryption with Equality Test 131 9. Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds. EUROCRYPT 2004. LNCS, vol. 3027, pp. 207222. Springer, Heidelberg (2004 10. Canetti, R., Halevi, S., Ka
19、tz, J.: A forward-secure public-key encryption scheme. J. Cryptology 20(3, 265294 (2007 11. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed. CRYPTO 1998. LNCS, vol. 1462, pp. 1325. Springer, Heidelberg (1998 1
20、2. Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed. EUROCRYPT 2002. LNCS, vol. 2332, pp. 4564. Springer, Heidelberg (2002 13. Dent, A.W.: A brief history of provably-secure public-key encryption. In: Vaude
21、nay, S. (ed. AFRICACRYPT 2008. LNCS, vol. 5023, pp. 357370. Springer, Heidelberg (2008 14. Die, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644654 (1978 15. Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM J. Comput. 30(2, 391437 (200
22、0 16. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001 17. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2, 270299 (1984 18. Hanaoka, G., Kurosawa, K.: Ecient chosen ciphertext secure public key encryption under the
23、 computational die-hellman assumption. In: Pieprzyk, J. (ed. ASIACRYPT 2008. LNCS, vol. 5350, pp. 308325. Springer, Heidelberg (2008 19. Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed. CRYPTO 2007. LNCS, vol. 4622, pp. 553571. Springer, Heidelberg (2007 20. Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 曲類中藥飲片批發(fā)企業(yè)ESG實踐與創(chuàng)新戰(zhàn)略研究報告
- 模塊化客廳套裝企業(yè)制定與實施新質(zhì)生產(chǎn)力戰(zhàn)略研究報告
- 證券市場管理服務企業(yè)縣域市場拓展與下沉戰(zhàn)略研究報告
- 竹淘米、洗菜籮筐企業(yè)數(shù)字化轉型與智慧升級戰(zhàn)略研究報告
- 2025年碾磨谷物及谷物加工品項目發(fā)展計劃
- 二零二五年度鄉(xiāng)村旅游土地租賃及收益分成合同
- 2025年度車輛租賃行業(yè)政策研究與合作合同
- 2025年度科技園區(qū)企業(yè)入駐科技創(chuàng)新合作意向書
- 二零二五年度房產(chǎn)過戶稅費結算及協(xié)助協(xié)議
- 二零二五年度新材料研發(fā)與產(chǎn)業(yè)化基地租賃服務協(xié)議
- 安全生產(chǎn)承包的合同
- 8.3 摩擦力(共28張) 2024-2025學年人教版物理八年級下冊
- 2025年陜西延長石油物流集團有限公司招聘筆試參考題庫含答案解析
- 2025屆高考作文素材積累專題(春晚、哪吒2、deepseek)課件
- 2025年部編版語文三年級下冊全冊單元測試題附答案(共8個單元)
- 兒童腺樣體肥大治療方案-深度研究
- 2025年合肥經(jīng)濟技術職業(yè)學院單招職業(yè)適應性測試題庫帶答案
- 2025年懷化職業(yè)技術學院單招職業(yè)技能測試題庫必考題
- 2025年中國床墊機械行業(yè)市場發(fā)展監(jiān)測及投資戰(zhàn)略咨詢報告
- 色卡-CBCC中國建筑標準色卡(千色卡1026色)
- 破產(chǎn)管理人考試題庫及答案
評論
0/150
提交評論