Advances in Cryptology – CRYPTO 2013
Volume 8042 of the series Lecture Notes in Computer Science pp 374-391
Message-Locked Encryption for Lock-Dependent Messages
- Martín AbadiAffiliated withMicrosoft Research Silicon ValleyUniversity of California, Santa Cruz
- , Dan BonehAffiliated withStanford University
- , Ilya MironovAffiliated withMicrosoft Research Silicon Valley
- , Ananth RaghunathanAffiliated withStanford University
- , Gil SegevAffiliated withStanford University
Abstract
Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi, and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) schemes which subsumes convergent encryption and its variants. Such schemes do not rely on permanent secret keys, but rather encrypt messages using keys derived from the messages themselves.
We strengthen the notions of security proposed by Bellare et al. by considering plaintext distributions that may depend on the public parameters of the schemes. We refer to such inputs as lock-dependent messages. We construct two schemes that satisfy our new notions of security for message-locked encryption with lock-dependent messages.
Our main construction deviates from the approach of Bellare et al. by avoiding the use of ciphertext components derived deterministically from the messages. We design a fully randomized scheme that supports an equality-testing algorithm defined on the ciphertexts.
Our second construction has a deterministic ciphertext component that enables more efficient equality testing. Security for lock-dependent messages still holds under computational assumptions on the message distributions produced by the attacker.
In both of our schemes the overhead in the length of the ciphertext is only additive and independent of the message length.
Keywords
Deduplication convergent encryption message-locked encryption- Title
- Message-Locked Encryption for Lock-Dependent Messages
- Book Title
- Advances in Cryptology – CRYPTO 2013
- Book Subtitle
- 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
- Pages
- pp 374-391
- Copyright
- 2013
- DOI
- 10.1007/978-3-642-40041-4_21
- Print ISBN
- 978-3-642-40040-7
- Online ISBN
- 978-3-642-40041-4
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8042
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Deduplication
- convergent encryption
- message-locked encryption
- Industry Sectors
- eBook Packages
- Editors
-
-
Ran Canetti
(16)
-
Juan A. Garay
(17)
-
Ran Canetti
- Editor Affiliations
-
- 16. Boston University and Tel Aviv University
- 17. AT&T Labs – Research
- Authors
-
- Martín Abadi (18) (20)
- Dan Boneh (19)
- Ilya Mironov (18)
- Ananth Raghunathan (19)
- Gil Segev (19)
- Author Affiliations
-
- 18. Microsoft Research Silicon Valley, USA
- 20. University of California, Santa Cruz, USA
- 19. Stanford University, USA
Continue reading...
To view the rest of this content please follow the download PDF link above.