On the Security of Generalized Selective Decryption

ثبت نشده
چکیده

Generalized Selective Decryption (GSD) is an easy to define game based on a symmetric encryption scheme Enc. It was introduced by Panjwani [TCC’07] to capture the difficulty of proving adaptive security of certain protocols. In the GSD game there are n keys k1, . . . , kn, which the adversary may adaptively corrupt (i.e., learn); moreover, it can ask for encryptions Encki(kj) of keys under other keys. The adversary’s task is to distinguish keys (which it cannot trivially compute) from random. Proving the hardness of GSD assuming only IND-CPA security of the encryption scheme is surprisingly hard. One can prove security using “complexity leveraging”, but this reduction loses a factor exponential in n, which makes the proof basically useless. We can think of the GSD game as building a graph on n vertices, where we add an edge i→ j when the adversary asks for an encryption of kj under ki. If restricted to graphs of depth `, Panjwani gave an improved reduction that lost only a factor exponential in ` (not n). To date, this is the only non-trivial result known for GSD or related problems. In this paper we give almost polynomial reductions for large classes of graphs. Most importantly, we show that the security of the GSD game restricted to trees (which is an important special case abstracting some real-world protocols like the Logical Key Hierarchy protocol) can be proven losing only a quasi-polynomial factor n . Our proof borrows ideas from the “nested hybrids” technique recently introduced by Fuchsbauer at al. [Asiacrypt’14] for proving the adaptive security of constrained PRFs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

A Quasipolynomial Reduction for Generalized Selective Decryption on Trees

Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric encryption scheme Enc that captures the difficulty of proving adaptive security of certain protocols, most notably the Logical Key Hierarchy (LKH) multicast encryption protocol. In the GSD game there are n keys k1, . . . , kn, which the adversary may adaptively corrupt (learn); moreover, it can as...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

A Provable Security Scheme of ID-Based Threshold Decryption

This paper presents an ID-based threshold decryption scheme and proves that it is selective chosen ciphertext secure without random oracles based on solving decisional BDHI q t − ) , , ( ε problem assumption.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014