Chosen-ciphertext attack secure public key encryption with auxiliary inputs

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the Naor-Yung 'double encryption' paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model.

Original languageEnglish
Pages (from-to)1404-1411
Number of pages8
JournalSecurity and Communication Networks
Volume5
Issue number12
DOIs
StatePublished - Dec 2012

Keywords

  • Auxiliary input
  • Chosen-ciphertext attacks
  • Naor-Yung paradigm
  • Public key encryption

Fingerprint

Dive into the research topics of 'Chosen-ciphertext attack secure public key encryption with auxiliary inputs'. Together they form a unique fingerprint.

Cite this