Abstract
We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the Naor-Yung 'double encryption' paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model.
| Original language | English |
|---|---|
| Pages (from-to) | 1404-1411 |
| Number of pages | 8 |
| Journal | Security and Communication Networks |
| Volume | 5 |
| Issue number | 12 |
| DOIs | |
| State | Published - Dec 2012 |
Keywords
- Auxiliary input
- Chosen-ciphertext attacks
- Naor-Yung paradigm
- Public key encryption