Public-key cryptosystems provably secure against chosen ciphertext attacks
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Journal of Cryptology
FOCS '09 Proceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science
Secure hybrid encryption from weakened key encapsulation
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Bounded CCA2-secure encryption
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Black-box construction of a non-malleable encryption scheme from any semantically secure one
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Some (in)sufficient conditions for secure hybrid encryption
Information and Computation
A new strong multiple designated verifiers signature
International Journal of Grid and Utility Computing
Universally composable zero-knowledge sets
International Journal of Grid and Utility Computing
A new proxy blind signature scheme
International Journal of Grid and Utility Computing
Adaptive trapdoor functions and chosen-ciphertext security
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Construction of a non-malleable encryption scheme from any semantically secure one
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Chosen-Ciphertext security from tag-based encryption
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Detecting dangerous queries: a new approach for chosen ciphertext security
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
Detectable Chosen Ciphertext Security DCCA security is a weaker notion than CCA security. An 'inner-outer' structure is shown to build a CCA-secure PKE from a DCCA-secure PKE, a 1-bounded CCA-secure PKE, and a CPA-secure PKE. In this paper, we first show passive security for DEMs is sufficient for achieving DCCA-secure hybrid PKEs both for KEM+DEM and Tag-KEM/DEM paradigms. Then two DCCA-secure PKEs constructed from CCA secure KEMs are presented. In addition, a counter example to show that the 1-bounded CCA secure component in the 'inner-outer' structure cannot be weakened to CPA one is given, and some possible methods for constructing CCA-secure PKEs from DCCA-secure KEMs are discussed.