Public-key encryption with non-interactive opening: new constructions and stronger definitions

  • Authors:
  • David Galindo;Benoît Libert;Marc Fischlin;Georg Fuchsbauer;Anja Lehmann;Mark Manulis;Dominique Schröder

  • Affiliations:
  • University of Luxembourg;Université catholique de Louvain, Crypto Group, Belgium;TU Darmstadt & CASED, Germany;LIENS - CNRS - INRIA, École normale supérieure, Paris, France;TU Darmstadt & CASED, Germany;TU Darmstadt & CASED, Germany;TU Darmstadt & CASED, Germany

  • Venue:
  • AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Public-key encryption schemes with non-interactive opening (PKENO) allow a receiver to non-interactively convince third parties that a ciphertext decrypts to a given plaintext or, alternatively, that such a ciphertext is invalid. Two practical generic constructions for PKENO have been proposed so far, starting from either identity-based encryption or public-key encryption with witness-recovering decryption (PKEWR). We show that the known transformation from PKEWR to PKENO fails to provide chosen-ciphertext security; only the transformation from identity-based encryption remains thus valid. Next, we prove that PKENO can alternatively be built out of robust non-interactive threshold public-key cryptosystems, a primitive that differs from identity-based encryption. Using the new transformation, we construct two efficient PKENO schemes: one based on the Decisional Diffie-Hellman assumption (in the Random-Oracle Model) and one based on the Decisional Linear assumption (in the standard model). Last but not least, we propose new applications of PKENO in protocol design. Motivated by these applications, we reconsider proof soundness for PKENO and put forward new definitions that are stronger than those considered so far. We give a taxonomy of all definitions and demonstrate them to be satisfiable.