eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2021/1268

Simulation-Based Bi-Selective Opening Security for Public Key Encryption

Junzuo Lai, Rupeng Yang, Zhengan Huang, and Jian Weng

Abstract

Selective opening attacks (SOA) (for public-key encryption, PKE) concern such a multi-user scenario, where an adversary adaptively corrupts some fraction of the users to break into a subset of honestly created ciphertexts, and tries to learn the information on the messages of some unopened (but potentially related) ciphertexts. Until now, the notion of selective opening attacks is only considered in two settings: sender selective opening (SSO), where part of senders are corrupted and messages together with randomness for encryption are revealed; and receiver selective opening (RSO), where part of receivers are corrupted and messages together with secret keys for decryption are revealed. In this paper, we consider a more natural and general setting for selective opening security. In the setting, the adversary may adaptively corrupt part of senders and receivers \emph{simultaneously}, and get the plaintext messages together with internal randomness for encryption and secret keys for decryption, while it is hoped that messages of uncorrupted parties remain protected. We denote it as Bi-SO security since it is reminiscent of Bi-Deniability for PKE. We first formalize the requirement of Bi-SO security by the simulation-based (SIM) style, and prove that some practical PKE schemes achieve SIM-Bi-$\text{SO}$-CCA security in the random oracle model. Then, we suggest a weak model of Bi-SO security, denoted as SIM-wBi-$\text{SO}$-CCA security, and argue that it is still meaningful and useful. We propose a generic construction of PKE schemes that achieve SIM-wBi-$\text{SO}$-CCA security in the standard model and instantiate them from various standard assumptions. Our generic construction is built on a newly presented primitive, namely, universal$_{\kappa}$ hash proof system with key equivocability, which may be of independent interest.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in ASIACRYPT 2021
Keywords
Public Key EncryptionMulti-User SecuritySelective Opening SecuritySimulation-Based SecurityChosen-Ciphertext Security
Contact author(s)
zhahuang sjtu @ gmail com
History
2021-09-22: received
Short URL
https://ia.cr/2021/1268
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1268,
      author = {Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng},
      title = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1268},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1268}},
      url = {https://eprint.iacr.org/2021/1268}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.