首页> 外文会议>Advances in Cryptology - ASIARYPT 2006; Lecture Notes in Computer Science; 4284 >Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption
【24h】

Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption

机译:在基于分解的加密中以单向方式与选择的密文安全性进行交易

获取原文
获取原文并翻译 | 示例

摘要

We revisit a long-lived folklore impossibility result for factoring-based encryption and properly establish that reaching maximally secure one-wayness (I.e. equivalent to factoring) and resisting chosen-ciphertext attacks (CCA) are incompatible goals for single-key cryptosystems. We pinpoint two tradeoffs between security notions in the standard model that have always remained unnoticed in the Random Oracle (RO) model. These imply that simple RO-model schemes such as Rabin/RW-SAEP[+]/OAEP[+][+], EPOC-2, etc. admit no instantiation in the standard model which CCA security is equivalent to factoring via a key-preserving reduction. We extend this impossibility to arbitrary reductions assuming non-malleable key generation, a property capturing the intuition that factoring a modulus n should not be any easier when given a factoring oracle for moduli n' ≠ n. The only known countermeasures against our impossibility results, besides malleable key generation, are the inclusion of an additional random string in the public key, or encryption twinning as in Naor-Yung or Dolev-Dwork-Naor constructions.
机译:我们重新审视了基于分解因数的加密的长期存在的民间传说不可能的结果,并适当地确定达到最大安全的单向性(即等效于分解因数)和抵制选择密文攻击(CCA)是单密钥密码系统的不兼容目标。我们指出了在标准模型中的安全性概念之间的两个权衡,它们在随机Oracle(RO)模型中始终没有引起注意。这意味着简单的RO模型方案(例如Rabin / RW-SAEP [+] / OAEP [+] [+],EPOC-2等)在标准模型中不允许实例化,CCA安全性等效于通过密钥进行分解-保留减少量。我们将这种可能性扩展到假设非可变密钥生成的任意缩减,这是一种直觉的性质,即当给定模n'≠n的分解式预言时,分解系数n并不容易。除可延展密钥生成外,针对我们不可能结果的唯一已知对策是在公钥中包含其他随机字符串,或者像Naor-Yung或Dolev-Dwork-Naor构造中的加密孪生。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号