Simulation-based selective opening security for receivers under chosen-ciphertext attacks

Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li

Research output: Journal article publicationJournal articleAcademic researchpeer-review

13 Citations (Scopus)

Abstract

Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the users to obtain the decryption keys corresponding to some of the ciphertexts, the remaining (potentially related) ciphertexts retain their privacy. In this paper, we study simulation-based selective opening security for receivers of public key encryption (PKE) schemes under chosen-ciphertext attacks (RSIM-SO-CCA). Concretely, we first show that some known PKE schemes meet RSIM-SO-CCA security. Then, we introduce the notion of master-key SOA security for identity-based encryption (IBE), and extend the Canetti–Halevi–Katz transformation to show generic PKE constructions achieving RSIM-SO-CCA security. Finally, we show how to construct an IBE scheme achieving master-key SOA security.

Original languageEnglish
Pages (from-to)1345-1371
Number of pages27
JournalDesigns, Codes, and Cryptography
Volume87
Issue number6
DOIs
Publication statusPublished - 15 Jun 2019

Keywords

  • Chosen-ciphertext attacks
  • Identity-based encryption
  • Public-key encryption
  • Selective opening security for receivers
  • Simulation-based security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science Applications
  • Discrete Mathematics and Combinatorics
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Simulation-based selective opening security for receivers under chosen-ciphertext attacks'. Together they form a unique fingerprint.

Cite this