Annual International Cryptology Conference

CRYPTO 2008: Advances in Cryptology – CRYPTO 2008 pp 335-359

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles

  • Alexandra Boldyreva
  • Serge Fehr
  • Adam O’Neill
Conference paper

DOI: 10.1007/978-3-540-85174-5_19

Volume 5157 of the book series Lecture Notes in Computer Science (LNCS)

Abstract

The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who provided the “strongest possible” notion of security for this primitive (called PRIV) and constructions in the random oracle (RO) model. We focus on constructing efficient deterministic encryption schemes without random oracles. To do so, we propose a slightly weaker notion of security, saying that no partial information about encrypted messages should be leaked as long as each message is a-priori hard-to-guess given the others (while PRIV did not have the latter restriction). Nevertheless, we argue that this version seems adequate for many practical applications. We show equivalence of this definition to single-message and indistinguishability-based ones, which are easier to work with. Then we give general constructions of both chosen-plaintext (CPA) and chosen-ciphertext-attack (CCA) secure deterministic encryption schemes, as well as efficient instantiations of them under standard number-theoretic assumptions. Our constructions build on the recently-introduced framework of Peikert and Waters (STOC ’08) for constructing CCA-secure probabilistic encryption schemes, extending it to the deterministic-encryption setting as well.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Alexandra Boldyreva
    • 1
  • Serge Fehr
    • 2
  • Adam O’Neill
    • 1
  1. 1.Georgia Institute of TechnologyAtlantaUSA
  2. 2.CWIAmsterdamNetherlands