Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Tightly CCA-secure encryption scheme in a multi-user setting with corruptions

Authors
Lee, YoungkyungLee, Dong HoonPark, Jong Hwan
Issue Date
Nov-2020
Publisher
SPRINGER
Keywords
Public-key encryption; Multi-user setting with corruptions; CDH; Tight security; Random oracle model
Citation
DESIGNS CODES AND CRYPTOGRAPHY, v.88, no.11, pp.2433 - 2452
Indexed
SCIE
SCOPUS
Journal Title
DESIGNS CODES AND CRYPTOGRAPHY
Volume
88
Number
11
Start Page
2433
End Page
2452
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/130385
DOI
10.1007/s10623-020-00794-z
ISSN
0925-1022
Abstract
The security of public-key encryption (PKE) schemes in a multi-user setting is aimed at capturing real-world scenarios in which an adversary could attack multiple users and multiple ciphertexts of its choice. However, the fact that a real-world adversary can also mount key-exposure attacks for a set of multiple public keys requires us to consider a more realistic notion of security in multi-user settings. In this study, we establish the security notion of PKE in a multi-user settingwith corruptions, where an adversary is able to issue (adaptive) encryption, decryption, and corruption (i.e., private key) queries. We then propose the first practical PKE scheme whose security is proven in a multi-user setting with corruptions. The security of our scheme is based on the computational Diffie-Hellman (CDH) assumption and is proven to be tightly chosen-ciphertext secure in a random oracle model. Our scheme essentially follows the recently proposed modular approach of combining KEM and augmented DEM in a multi-user setting, but we show that this modular approach works well in a multi-user setting with corruptions.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE