Selective opening chosen ciphertext security directly from the DDH assumption

  • Authors:
  • Shengli Liu;Fangguo Zhang;Kefei Chen

  • Affiliations:
  • Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China, State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, China;School of Information Science and Technology, Sun Yat-sen University, Guangzhou, China, State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, China;Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai, China

  • Venue:
  • NSS'12 Proceedings of the 6th international conference on Network and System Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get the random coins as well as the plaintexts used to generate ciphertexts. The attack is named "selective opening attack". We study how to achieve full-fledged chosen-ciphertext security in selective opening setting directly from the DDH assumption. Our construction is free of chameleon hashing, since tags are created for encryptions in a flexible way to serve the security proof.