Annual International Conference on the Theory and Applications of Cryptographic Techniques

EUROCRYPT 2011: Advances in Cryptology – EUROCRYPT 2011 pp 507-526

Efficient Circuit-Size Independent Public Key Encryption with KDM Security

  • Tal Malkin
  • Isamu Teranishi
  • Moti Yung
Conference paper

DOI: 10.1007/978-3-642-20465-4_28

Volume 6632 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Malkin T., Teranishi I., Yung M. (2011) Efficient Circuit-Size Independent Public Key Encryption with KDM Security. In: Paterson K.G. (eds) Advances in Cryptology – EUROCRYPT 2011. EUROCRYPT 2011. Lecture Notes in Computer Science, vol 6632. Springer, Berlin, Heidelberg

Abstract

Key Dependent Message (KDM) secure encryption is a new area which has attracted much research in recent years. Roughly speaking, a KDM secure scheme w.r.t. a function set \(\mathcal{F}\) provides security even if one encrypts a key dependent message f(sk) for any \(f\in\mathcal{F}\). We present a construction of an efficient public key encryption scheme which is KDM secure with respect to a large function set \(\mathcal{F}\). Our function set is a function computable by a polynomial-size Modular Arithmetic Circuit (MAC); we represent the set as Straight Line Programs computing multi-variable polynomials (an extended scheme includes all rational functions whose denominator and numerator are functions as above). Unlike previous schemes, our scheme is what we call flexible: the size of the ciphertext depends on the degree bound for the polynomials, and beyond this all parameters of the scheme are completely independent of the size of the function or the number of secret keys (users). We note that although KDM security has practical applications, all previous works in the standard model are either inefficient feasibility results when dealing with general circuits function sets, or are for a small set of functions such as linear functions. Efficiency of our scheme is dramatically improved compared to the previous feasibility results.

Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Tal Malkin
    • 1
  • Isamu Teranishi
    • 1
    • 2
  • Moti Yung
    • 1
    • 3
  1. 1.Columbia UniversityUSA
  2. 2.NECJapan
  3. 3.Google Inc.USA