Title
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem.
Abstract
The Key-Dependent Message (KDM) security requires that an encryption scheme remains secure, even if an adversary has access to encryptions of messages that depend on the secret key. In a multi-user surrounding, a key-dependent message can be any polynomial-time function f(sk1, sk2,..., skn) in the secret keys of the users. The Key-Dependent Message Chosen-Ciphertext (KDM-CCA2) security can be similarly defined if the adversary is also allowed to query a decryption oracle. To date, KDM security has been obtained by a few constructions. But most of them are limited f(sk1, sk2,..., skn) to affine functions. As to KDM-CCA2 security, there are only two constructions available. However, neither of them has comparable key sizes and reasonable efficiency, compared to the traditional KDM-free but CCA2 secure public key encryption schemes. This article defines a new function ensemble, and shows how to obtain KDM-CCA2 security with respect to this new ensemble from the traditional Cramer-Shoup (CS) cryptosystem. To obtain KDM security, the CS system has to be tailored for encryption of key-dependent messages. We present an efficient instantiation of the Cramer-Shoup public-key encryption (CS-PKE) scheme over the subgroup of quadratic residues in ℤp*, where p is a safe prime, and prove the CS-PKE to be KDM-CCA2 secure with respect to the new function ensemble. We show that our proposed ensemble covers some affine functions, as well as other functions that are not contained in the affine ensemble. At the same time, the CS-PKE scheme with respect to our proposed function ensemble finds immediate application to anonymous credential systems. Compared to other KDM-CCA2 secure proposals, the CS scheme is the most practical one due to its short ciphertext size and computational efficiency. © 2013 Springer-Verlag.
Year
DOI
Venue
2013
10.1007/978-3-642-39059-3_10
ACISP
Keywords
Field
DocType
adaptive chosen-ciphertext attack,cramer-shoup cryptosystem,key-dependent message security,public-key encryption
Semantic security,Cramer–Shoup cryptosystem,Computer science,Goldwasser–Micali cryptosystem,Deterministic encryption,Attribute-based encryption,Plaintext-aware encryption,Encryption,Theoretical computer science,Probabilistic encryption,Distributed computing
Conference
Volume
Issue
ISSN
7959 LNCS
null
16113349
Citations 
PageRank 
References 
3
0.39
29
Authors
3
Name
Order
Citations
PageRank
Baodong Qin119019.40
Shengli Liu248445.70
zhengan huang32419.82