Advances in Cryptology – CRYPTO 2012
Volume 7417 of the series Lecture Notes in Computer Science pp 590-607
Tightly Secure Signatures and Public-Key Encryption
- Dennis HofheinzAffiliated withKarlsruhe Institute of Technology
- , Tibor JagerAffiliated withKarlsruhe Institute of Technology
Abstract
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security can be proved under a standard assumption and does not degrade in either the number of users or the number of ciphertexts. In particular, our scheme can be safely deployed in unknown settings in which no a-priori bound on the number of encryptions and/or users is known.
As a central technical building block, we construct the first structure-preserving signature scheme with a tight security reduction. (This signature scheme may be of independent interest.) Combining this scheme with Groth-Sahai proofs yields a tightly simulation-sound non-interactive zero-knowledge proof system for group equations. If we use this proof system in the Naor-Yung double encryption scheme, we obtain a tightly IND-CCA secure public-key encryption scheme from the Decision Linear assumption.
We point out that our techniques are not specific to public-key encryption security. Rather, we view our signature scheme and proof system as general building blocks that can help to achieve a tight security reduction.
Keywords
Tight security proofs structure-preserving signatures public-key encryption Groth-Sahai proofs- Title
- Tightly Secure Signatures and Public-Key Encryption
- Book Title
- Advances in Cryptology – CRYPTO 2012
- Book Subtitle
- 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
- Pages
- pp 590-607
- Copyright
- 2012
- DOI
- 10.1007/978-3-642-32009-5_35
- Print ISBN
- 978-3-642-32008-8
- Online ISBN
- 978-3-642-32009-5
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 7417
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Tight security proofs
- structure-preserving signatures
- public-key encryption
- Groth-Sahai proofs
- Industry Sectors
- eBook Packages
- Editors
-
-
Reihaneh Safavi-Naini
(16)
-
Ran Canetti
(17)
-
Reihaneh Safavi-Naini
- Editor Affiliations
-
- 16. Department of Computer Science, University of Calgary
- 17. Department of Computer Science, University of Boston
- Authors
-
-
Dennis Hofheinz
(18)
-
Tibor Jager
(18)
-
Dennis Hofheinz
- Author Affiliations
-
- 18. Karlsruhe Institute of Technology, Germany
Continue reading...
To view the rest of this content please follow the download PDF link above.