Chosen-ciphertext attack secure public key encryption with auxiliary inputs

  • Authors:
  • Zongyang Zhang;Zhenfu Cao;Haifeng Qian

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, No. 800 Dongchuan Road, Shanghai, 200240, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, No. 800 Dongchuan Road, Shanghai, 200240, China;Department of Computer Science and Technology, East China Normal University, No. 500 Dongchuan Road, Shanghai, 200241, China

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We consider public key encryption (PKE) schemes with auxiliary input, that is, the adversary is given any computationally uninvertible function of the secret key. Previous result only achieves security under chosen-plaintext attacks (CPA). In this paper, we construct public key encryption schemes that are secure under chosen-ciphertext attacks even when the adversary is given any computationally uninvertible function of the secret key as an auxiliary input. We follow the Naor–Yung ‘double encryption’ paradigm and generally transform any chosen-plaintext attack secure public key encryption into a chosen-ciphertext attack secure one in the auxiliary input model. Copyright © 2012 John Wiley & Sons, Ltd.