Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption

  • David Naccache
  • Rainer Steinwandt
  • Adriana Suárez Corona
  • Moti Yung
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8642)

Abstract

Reverse Public-Key Encryption (RPKE) is a mode of operation exploiting a weak form of key privacy to provide message privacy. In principle, RPKE offers a fallback mode, if the underlying encryption scheme’s message secrecy fails while a weak form of key privacy survives. To date, all published RPKE constructions suffer from a low bandwidth, and low bandwidth seems naturally inherent to reverse encryption. We show how reverse encryption can, in connection with and as a novel application of anonymous broadcast encryption, achieve high-bandwidth. We point out that by using traditional and reverse encryption simultaneously, a form of crypto-steganographic channel inside a cryptosystem can be provided.

Keywords

public-key encryption mode of operation reverse public-key encryption broadcast encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [ABN10]
    Abdalla, M., Bellare, M., Neven, G.: Robust encryption. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 480–497. Springer, Heidelberg (2010), http://eprint.iacr.org/2008/440 CrossRefGoogle Scholar
  2. [FP12]
    Fazio, N., Perera, I.M.: Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 225–242. Springer, Heidelberg (2012), http://eprint.iacr.org/2012/129 CrossRefGoogle Scholar
  3. [LPQ12]
    Libert, B., Paterson, K.G., Quaglia, E.A.: Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 206–224. Springer, Heidelberg (2012), http://eprint.iacr.org/2011/476 CrossRefGoogle Scholar
  4. [NSY09]
    Naccache, D., Steinwandt, R., Yung, M.: Reverse Public Key Encryption. In: BIOSIG 2009 Proceedings. Lecture Notes in Informatics, pp. 155–169. GI, Springer (2009)Google Scholar
  5. [OS09]
    Overbeck, R., Sendrier, N.: Code-based cryptography. In: Post-Quantum Cryptography, pp. 95–145. Springer (2009)Google Scholar
  6. [vTJ11]
    Naccache, D.: Reverse Public Key Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn., p. 1044. Springer (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • David Naccache
    • 1
  • Rainer Steinwandt
    • 2
  • Adriana Suárez Corona
    • 3
  • Moti Yung
    • 4
  1. 1.École Normale SupérieureParis Cedex 05France
  2. 2.Florida Atlantic UniversityBoca RatonUSA
  3. 3.Universidad de LeónLeónSpain
  4. 4.Google Inc. and Columbia UniversityNew YorkUSA

Personalised recommendations