On the Security of Generalized Selective Decryption
ثبت نشده
چکیده
Generalized Selective Decryption (GSD) is an easy to define game based on a symmetric encryption scheme Enc. It was introduced by Panjwani [TCC’07] to capture the difficulty of proving adaptive security of certain protocols. In the GSD game there are n keys k1, . . . , kn, which the adversary may adaptively corrupt (i.e., learn); moreover, it can ask for encryptions Encki(kj) of keys under other keys. The adversary’s task is to distinguish keys (which it cannot trivially compute) from random. Proving the hardness of GSD assuming only IND-CPA security of the encryption scheme is surprisingly hard. One can prove security using “complexity leveraging”, but this reduction loses a factor exponential in n, which makes the proof basically useless. We can think of the GSD game as building a graph on n vertices, where we add an edge i→ j when the adversary asks for an encryption of kj under ki. If restricted to graphs of depth `, Panjwani gave an improved reduction that lost only a factor exponential in ` (not n). To date, this is the only non-trivial result known for GSD or related problems. In this paper we give almost polynomial reductions for large classes of graphs. Most importantly, we show that the security of the GSD game restricted to trees (which is an important special case abstracting some real-world protocols like the Logical Key Hierarchy protocol) can be proven losing only a quasi-polynomial factor n . Our proof borrows ideas from the “nested hybrids” technique recently introduced by Fuchsbauer at al. [Asiacrypt’14] for proving the adaptive security of constrained PRFs.
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملA Quasipolynomial Reduction for Generalized Selective Decryption on Trees
Generalized Selective Decryption (GSD), introduced by Panjwani [TCC’07], is a game for a symmetric encryption scheme Enc that captures the difficulty of proving adaptive security of certain protocols, most notably the Logical Key Hierarchy (LKH) multicast encryption protocol. In the GSD game there are n keys k1, . . . , kn, which the adversary may adaptively corrupt (learn); moreover, it can as...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملA Provable Security Scheme of ID-Based Threshold Decryption
This paper presents an ID-based threshold decryption scheme and proves that it is selective chosen ciphertext secure without random oracles based on solving decisional BDHI q t − ) , , ( ε problem assumption.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014