Title
A new construction on randomized message-locked encryption in the standard model via UCEs.
Abstract
We present a new primitive of randomized message-locked encryption (MLE) in this paper and define a new security model for it. The new primitive, named message-locked encryption3 (hereafter referred as MLE3), is actually a variant of randomized message-locked encryption (Bellare et al. Eurocrypt’13). In order to prevent trivial attacks, our primitive admits a semi-trusted server, which is allowed to hold a secret key of public key encryption (PKE), to verify the correctness of a tag. The new security notion, called privacy chosen-distribution attacks3 (PRV-CDA3), requires that a ciphertext generated by encrypting an unpredictable message and another ciphertext (possible invalid) chosen randomly from a ciphertext space are indistinguishable. Compared with the priori proposed security notion, privacy chosen-distribution attacks (PRV-CDA) (Bellare et al. Eurocrypt’13), which requires that two ciphertexts generated by encrypting two unpredictable messages are indistinguishable, the security notion we propose is much stronger. Based on the new primitive, under the blackbox reductions, we put forward a novel construction which achieves both privacy chosen-distribution attacks3 (PRV-CDA3) and strong tag consistency (STC) securities in the standard model via universal computational extractors (UCEs) (Bellare et al. Crypto’13). In addition, our scheme also provides the validity-testing for ciphertext.
Year
DOI
Venue
2017
10.1007/s11432-015-1037-2
SCIENCE CHINA Information Sciences
Keywords
Field
DocType
message-locked encryption3 (MLE3), universal computational extractors (UCEs), privacy chosendistribution attacks3 (PRV-CDA3), strong tag consistency (STC), standard model, 消息锁定加密3(MLE3), 通用计算提取器(UCEs), 秘密选取分布攻击3(PRV-CDA3), 强的标记一致性(STC), 标准模型(SM)
Standard Model,Computer security,Computer science,Attribute-based encryption,Correctness,Plaintext-aware encryption,Theoretical computer science,Encryption,Ciphertext,Public-key cryptography,Computer security model
Journal
Volume
Issue
ISSN
60
5
1869-1919
Citations 
PageRank 
References 
2
0.44
21
Authors
5
Name
Order
Citations
PageRank
Huige Wang184.94
Kefei Chen2486.25
Baodong Qin319019.40
Xuejia Lai41363259.39
Yunhua Wen561.86