Efficient KDM-CCA secure public-key encryption for polynomial functions

11Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

KDM[F]-CCA secure public-key encryption (PKE) protects the security of message f(sk), with f ∈ F, that is computed directly from the secret key, even if the adversary has access to a decryption oracle. An efficient KDM[Faff]-CCA secure PKE scheme for affine functions was proposed by Lu, Li and Jia (LLJ, EuroCrypt2015). We point out that their security proof cannot go through based on the DDH assumption. In this paper, we introduce a new concept Authenticated Encryption with Auxiliary-Input AIAE and define for it new security notions dealing with related-key attacks, namely IND-RKA security and weak INT-RKA security. We also construct such an AIAE w.r.t. a set of restricted affine functions from the DDH assumption. With our AIAE, – we construct the first efficient KDM[Faff]-CCA secure PKE w.r.t. affine functions with compact ciphertexts, which consist only of a constant number of group elements; – we construct the first efficient KDM[Fdpoly]-CCA secure PKE w.r.t. polynomial functions of bounded degree d with almost compact ciphertexts, and the number of group elements in a ciphertext is polynomial in d, independent of the security parameter. Our PKEs are both based on the DDH & DCR assumptions, free of NIZK and free of pairing.

Cite

CITATION STYLE

APA

Han, S., Liu, S., & Lyu, L. (2016). Efficient KDM-CCA secure public-key encryption for polynomial functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10032 LNCS, pp. 307–338). Springer Verlag. https://doi.org/10.1007/978-3-662-53890-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free