loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jinyong Chang 1 and Rui Xue 2

Affiliations: 1 Chinese Academy of Sciences and Changzhi University, China ; 2 Chinese Academy of Sciences, China

ISBN: 978-989-758-045-1

ISSN: 2184-2825

Keyword(s): Key-dependent Message Security, CCA Security, DDH Assumption, Public Key Encryption.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Privacy ; Security in Information Systems ; Security Requirements

Abstract: An encryption scheme is key-dependent message chosen plaintext attack (KDM-CPA) secure means that it is secure even if an adversary obtains encryptions of messages that depend on the secret key. However, there are not many schemes that are KDM-CPA secure, let alone key-dependent message chosen ciphertext attack (KDM-CCA) secure. So far, only two general constructions, due to Camenisch, Chandran, and Shoup (Eurocrypt 2009), and Hofheinz (Eurocrypt 2013), are known to be KDM-CCA secure in the stand model. Another scheme, a concrete implementation, was recently proposed by Qin, Liu and Huang (ACISP 2013), where a KDM-CCA secure scheme was obtained from the classic Cramer-Shoup (CS) cryptosystem w.r.t. a new family of functions. In this paper, we revisit the KDM-CCA security of the CS-scheme and prove that, in two-user case, the CS-scheme achieves KDM-CCA security w.r.t. richer ensembles, which covers the result of Qin et al.. In addition, we present another proof about the result in (QLH 13) by extending our approach used in two-user case to n-user case, which achieves a tighter reduction to the decisional Diffie-Hellman (DDH) assumption. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.200.252.156

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chang, J. and Xue, R. (2014). KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, ISSN 2184-2825, pages 299-306. DOI: 10.5220/0005048802990306

@conference{secrypt14,
author={Jinyong Chang. and Rui Xue.},
title={KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={299-306},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005048802990306},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited
SN - 978-989-758-045-1
AU - Chang, J.
AU - Xue, R.
PY - 2014
SP - 299
EP - 306
DO - 10.5220/0005048802990306

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.