Paper 2022/1176

Anonymous Public Key Encryption under Corruptions

Zhengan Huang, Peng Cheng Laboratory
Junzuo Lai, Jinan University
Shuai Han, Shanghai Jiao Tong University
Lin Lyu, University of Wuppertal
Jian Weng, Jinan University
Abstract

Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys are used to generate them. Corruptions are common threats in the multi-user scenario but anonymity of PKE under corruptions is less studied in the literature. In TCC 2020, Benhamouda et al. first provide a formal characterization for anonymity of PKE under a specific type of corruption. However, no known PKE scheme is proved to meet their characterization. To the best of our knowledge, all the PKE application scenarios which require anonymity also require confidentiality. However, in the work by Benhamouda et al., different types of corruptions for anonymity and confidentiality are considered, which can cause security pitfalls. What's worse, we are not aware of any PKE scheme which can provide both anonymity and confidentiality under the same types of corruptions. In this work, we introduce a new security notion for PKE called ANON-RSO$_k\&$C security, capturing anonymity under corruptions. We also introduce SIM-RSO$_k\&$C security which captures confidentiality under the same types of corruptions. We provide a generic framework of constructing PKE scheme which can achieve the above two security goals simultaneously based on a new primitive called key and message non-committing encryption (KM-NCE). Then we give a general construction of KM-NCE utilizing a variant of hash proof system (HPS) called Key-Openable HPS. We also provide Key-Openable HPS instantiations based on the matrix decisional Diffie-Hellman assumption. Therefore, we can obtain various concrete PKE instantiations achieving the two security goals in the standard model with compact ciphertexts. Furthermore, for some PKE instantiation, its security reduction is tight.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A major revision of an IACR publication in ASIACRYPT 2022
Keywords
public-key encryption multi-user security anonymity receiver selective opening adaptive user corruption
Contact author(s)
zhahuang sjtu @ gmail com
laijunzuo @ gmail com
dalen17 @ sjtu edu cn
lin lyu @ uni-wuppertal de
cryptjweng @ gmail com
History
2022-09-09: approved
2022-09-08: received
See all versions
Short URL
https://ia.cr/2022/1176
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/1176,
      author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng},
      title = {Anonymous Public Key Encryption under Corruptions},
      howpublished = {Cryptology ePrint Archive, Paper 2022/1176},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/1176}},
      url = {https://eprint.iacr.org/2022/1176}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.