Efficient completely non-malleable and RKA secure public key encryptions

  • Shi Feng Sun
  • , Udaya Parampalli
  • , Tsz Hon Yuen
  • , Yu Yu
  • , Dawu Gu*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Motivated by tampering attacks in practice, two different but related security notions, termed complete non-malleability and relatedkey attack security, have been proposed recently. In this work, we study their relations and present the first public key encryption scheme that is secure in both notions under standard assumptions. Moreover, by exploiting the technique for achieving complete non-malleability, we give a practical scheme for the related-key attack security. Precisely, the scheme is proven secure against polynomial functions of bounded degree d under a newly introduced hardness assumption called dmodified extended decisional bilinear Diffie-Hellman assumption. Since the schemes are constructed in a direct way instead of relying on the noninteractive zero knowledge proof or signature techniques, they not only achieve the strong security notions but also have better performances.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
EditorsJoseph K. Liu, Ron Steinfeld
PublisherSpringer Verlag
Pages134-150
Number of pages17
ISBN (Print)9783319403663
DOIs
StatePublished - 2016
Externally publishedYes
Event21st Australasian Conference on Information Security and Privacy, ACISP 2016 - Melbourne, Australia
Duration: 4 Jul 20166 Jul 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9723
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference21st Australasian Conference on Information Security and Privacy, ACISP 2016
Country/TerritoryAustralia
CityMelbourne
Period4/07/166/07/16

Keywords

  • Chosen-ciphertext attack
  • Complete non-malleability
  • Public key encryption
  • Related-key attack

Fingerprint

Dive into the research topics of 'Efficient completely non-malleable and RKA secure public key encryptions'. Together they form a unique fingerprint.

Cite this