Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen ciphertext attack. One scheme is based on Paillier’s Decision Composite Residuosity assumption, while another is based in the classical Quadratic Residuosity assumption. The analysis is in the standard cryptographic model, i.e., the security of our schemes does not rely on the Random Oracle model. Moreover, we introduce a general framework that allows one to construct secure encryption schemes in a generic fashion from language membership problems that satisfy certain technical requirements. Our new schemes fit into this framework, as does the Cramer-Shoup scheme based on the Decision Diffie-Hellman assumption.
KeywordsHash Function Decryption Algorithm Random Oracle Model Hash Family Decryption Oracle
- [BR]M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In Proc. ACM Computer and Communication Security’ 93, ACM Press, 1993.Google Scholar
- [CGH]R. Canetti, O. Goldreich, and S. Halevi. The random oracle model, revisited. In Proc. STOC’ 98, ACM Press, 1998.Google Scholar
- [CS1]R. Cramer and V. Shoup. A practical public key cryptosystem secure against adaptive chosen cipher text attacks. In Proc. CRYPTO’ 98, Springer Verlag LNCS, 1998.Google Scholar
- [CS2]R. Cramer and V. Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public key encryption. Cryptology ePrint Archive, Report 2001/085, 2001. http://eprint.iacr.org.
- [CS3]R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. Cryptology ePrint Archive, Report 2001/108, 2001. http://eprint.iacr.org.
- [L]M. Luby. Pseudorandomness and Cryptographic Applications. Princeton University Press, 1996.Google Scholar
- [NY1]M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proc. STOC’ 9, ACM Press, 1989.Google Scholar
- [P]P. Paillier. Public-key cryptosystems based on composite degree residue classes. In Proc. EURO CRYPT’ 99, Springer Verlag LNCS, 1999.Google Scholar
- [RS]C. Rackoff and D. Simon. Non-interactive zero knowledge proof of knowledge and chosen ciphertext attacks. In Proc. CRYPTO’ 91, Springer Verlag LNCS, 1991.Google Scholar