File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-030-64837-4_7
- Scopus: eid_2-s2.0-85097814771
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting
Title | Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting |
---|---|
Authors | |
Issue Date | 2020 |
Publisher | Springer. |
Citation | The 26th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020), Daejeon, South Korea, 7–11 December 2020. In Moriai, S & Wang, H. (eds), Advances in Cryptology - ASIACRYPT 2020, Proceedings, Part I, p. 191-220 How to Cite? |
Abstract | Public key encryption (PKE) schemes are usually deployed in an open system with numerous users. In practice, it is common that some users are corrupted. A PKE scheme is said to be receiver selective opening (RSO) secure if it can still protect messages transmitted to uncorrupted receivers after the adversary corrupts some receivers and learns their secret keys. This is usually defined by requiring the existence of a simulator that can simulate the view of the adversary given only the opened messages. Existing works construct RSO secure PKE schemes in a single-challenge setting, where the adversary can only obtain one challenge ciphertext for each public key. However, in practice, it is preferable to have a PKE scheme with RSO security in the multi-challenge setting, where public keys can be used to encrypt multiple messages. In this work, we explore the possibility of achieving PKE schemes with receiver selective opening security in the multi-challenge setting. Our contributions are threefold. First, we demonstrate that PKE schemes with RSO security in the single-challenge setting are not necessarily RSO secure in the multi-challenge setting. Then, we show that it is impossible to achieve RSO security for PKE schemes if the number of challenge ciphertexts under each public key is a priori unbounded. In particular, we prove that no PKE scheme can be RSO secure in the k-challenge setting (i.e., the adversary can obtain k challenge ciphertexts for each public key) if its secret key contains less than k bits. On the positive side, we give a concrete construction of PKE scheme with RSO security in the k-challenge setting, where the ratio of the secret key length to k approaches the lower bound 1. |
Persistent Identifier | http://hdl.handle.net/10722/305947 |
ISBN | |
Series/Report no. | Lecture Notes in Computer Science ; v. 12491 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, R | - |
dc.contributor.author | Lai, J | - |
dc.contributor.author | Huang, Z | - |
dc.contributor.author | Au, AMH | - |
dc.contributor.author | Xu, Q | - |
dc.contributor.author | Susilo, W | - |
dc.date.accessioned | 2021-10-20T10:16:37Z | - |
dc.date.available | 2021-10-20T10:16:37Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | The 26th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020), Daejeon, South Korea, 7–11 December 2020. In Moriai, S & Wang, H. (eds), Advances in Cryptology - ASIACRYPT 2020, Proceedings, Part I, p. 191-220 | - |
dc.identifier.isbn | 9783030648367 | - |
dc.identifier.uri | http://hdl.handle.net/10722/305947 | - |
dc.description.abstract | Public key encryption (PKE) schemes are usually deployed in an open system with numerous users. In practice, it is common that some users are corrupted. A PKE scheme is said to be receiver selective opening (RSO) secure if it can still protect messages transmitted to uncorrupted receivers after the adversary corrupts some receivers and learns their secret keys. This is usually defined by requiring the existence of a simulator that can simulate the view of the adversary given only the opened messages. Existing works construct RSO secure PKE schemes in a single-challenge setting, where the adversary can only obtain one challenge ciphertext for each public key. However, in practice, it is preferable to have a PKE scheme with RSO security in the multi-challenge setting, where public keys can be used to encrypt multiple messages. In this work, we explore the possibility of achieving PKE schemes with receiver selective opening security in the multi-challenge setting. Our contributions are threefold. First, we demonstrate that PKE schemes with RSO security in the single-challenge setting are not necessarily RSO secure in the multi-challenge setting. Then, we show that it is impossible to achieve RSO security for PKE schemes if the number of challenge ciphertexts under each public key is a priori unbounded. In particular, we prove that no PKE scheme can be RSO secure in the k-challenge setting (i.e., the adversary can obtain k challenge ciphertexts for each public key) if its secret key contains less than k bits. On the positive side, we give a concrete construction of PKE scheme with RSO security in the k-challenge setting, where the ratio of the secret key length to k approaches the lower bound 1. | - |
dc.language | eng | - |
dc.publisher | Springer. | - |
dc.relation.ispartof | Advances in Cryptology - ASIACRYPT 2020: The 26th International Conference on the Theory and Application of Cryptology and Information Security | - |
dc.relation.ispartofseries | Lecture Notes in Computer Science ; v. 12491 | - |
dc.title | Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Yang, R: rpyang@hku.hk | - |
dc.identifier.email | Au, AMH: manhoau@hku.hk | - |
dc.identifier.authority | Au, AMH=rp02638 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-030-64837-4_7 | - |
dc.identifier.scopus | eid_2-s2.0-85097814771 | - |
dc.identifier.hkuros | 327810 | - |
dc.identifier.volume | pt. 1 | - |
dc.identifier.spage | 191 | - |
dc.identifier.epage | 220 | - |
dc.publisher.place | Cham | - |