Abstract
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the easiest to understand to date. In particular, it is only slightly more involved than the Naor-Yung encryption scheme that is secure against passive chosen-ciphertext attacks (CCA1). We stress that the focus of this paper is on simplicity only.
This work was carried out while the author was at the Weizmann Institute of Science.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Bellare and P. Rogaway. Optimal asymmetric encryption — How to encrypt with RSA. In EUROCRYPT’94, Springer-Verlag (LNCS 950), pages 92–111, 1994.
D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In CRYPTO’98, Springer-Verlag (LNCS 1462), pages 1–12, 1998.
M. Blum, P. Feldman and S. Micali. Non-interactive zero-knowledge and its applications. In 20th STOC, pages 103–112, 1988.
R. Cramer and V. Shoup. A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack. In CRYPTO’98, Springer-Verlag (LNCS 1462), pages 13–25, 1998.
R. Cramer and V. Shoup. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In EUROCRYPT 2002, Springer-Verlag (LNCS 2332), pages 45–64, 2002.
A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano and A. Sahai. Robust Non-interactive Zero-Knowledge. In CRYPTO 2001, Springer-Verlag (LNCS 2139), pages 566–598, 2001.
D. Dolev, C. Dwork and M. Naor. Non-malleable Cryptography. In SICOMP, 30(2):391–437, 2000.
U. Feige, D. Lapidot and A. Shamir. Multiple Non-Interactive Zero-Knowledge Proofs Under General Assumptions. In SICOMP, 29(1):1–28, 1999.
U. Feige and A. Shamir. Witness Indistinguishability and Witness Hiding Protocols. In 22nd STOC, pages 416–426, 1990.
O. Goldreich. Foundation of Cryptography — Basic Tools. Cambridge University Press, 2001.
O. Goldreich. Foundations of Cryptography: Volume 2 — Basic Applications. To be published. Available from http://www.wisdom.weizmann.ac.il/~oded.
Y. Lindell. A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions. Cryptology ePrint Archive, Report 2002/057, http://eprint.iacr.org/, 2002.
M. Naor. Bit Commitment using Pseudorandom Generators. Journal of Cryptology, 4(2):151–158, 1991.
M. Naor and M. Yung. Universal One-Way Hash Functions and their Cryptographic Applications. In 21st STOC, pages 33–43, 1989.
M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In 22nd STOC, pages 427–437, 1990.
J. Rompel. One-way functions are necessary and efficient for secure signatures. In 22nd STOC, pages 387–394, 1990.
A. Sahai. Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. In 40th FOCS, pages 543–553, 1999.
A. Sahai. Simulation-Sound Non-Interactive Zero Knowledge. Manuscript, 2000.
V. Shoup. Why chosen ciphertext security matters. IBM Research Report RZ 3076, November, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 International Association for Cryptologic Research
About this paper
Cite this paper
Lindell, Y. (2003). A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. In: Biham, E. (eds) Advances in Cryptology — EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol 2656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39200-9_15
Download citation
DOI: https://doi.org/10.1007/3-540-39200-9_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-14039-9
Online ISBN: 978-3-540-39200-2
eBook Packages: Springer Book Archive