首页> 外文会议>Advances in cryptology - CRYPTO 2010 >Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
【24h】

Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)

机译:子组不可区分性下的循环和泄漏弹性公共密钥加密(或:二次剩余反击)

获取原文
获取原文并翻译 | 示例

摘要

The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR) assumption), achieve key-dependent message security as well as high resilience to secret key leakage and high resilience to the presence of auxiliary input information. In particular, under what we call the subgroup indistinguishability assumption, of which the QR and DCR are special cases, we can construct a scheme that has: - Key-dependent message (circular) security. Achieves security even when encrypting affine functions of its own secret key (in fact, w.r.t. affine "key-cycles" of predefined length). Our scheme also meets the requirements for extending key-dependent message security to broader classes of functions beyond affine functions using previous techniques of Brakerski et al. or Barak et al. - Leakage resiliency. Remains secure even if any adversarial low-entropy (efficiently computable) function of the secret key is given to the adversary. A proper selection of parameters allows for a "leakage rate" of (1 - o(1)) of the length of the secret key. - Auxiliary-input security. Remains secure even if any sufficiently hard to invert (efficiently computable) function of the secret key is given to the adversary. Our scheme is the first to achieve key-dependent security and auxiliary-input security based on the DCR and QR assumptions. Previous schemes that achieved these properties relied either on the DDH or LWE assumptions. The proposed scheme is also the first to achieve leakage resiliency for leakage rate (1 - o(1)) of the secret key length, under the QR assumption. We note that leakage resilient schemes under the DCR and the QR assumptions, for the restricted case of composite modulus product of safe primes, were implied by the work of Naor and Segev, using hash proof systems. However, under the QR assumption, known constructions of hash proof systems only yield a leakage rate of o(1) of the secret key length.
机译:这项工作的主要结果是新的公开密钥加密方案,该方案在二次残差(QR)假设(或Paillier决策复合残差(DCR)假设)下,实现了依赖于密钥的消息安全性以及对密钥泄漏的高复原力对辅助输入信息的存在具有很高的弹性。特别是,在我们称之为子群不可区分性的假设(QR和DCR是特殊情况)下,我们可以构建一种方案,该方案具有:-密钥相关消息(循环)安全性。即使在加密自己的秘密密钥的仿射功能(实际上是预定义长度的仿射“密钥循环”)时也能达到安全性。我们的方案还满足使用Brakerski等人的先前技术将与密钥相关的消息安全性扩展到仿射功能以外的更广泛功能的要求。或Barak等。 -泄漏弹性。即使将秘密密钥的任何对抗性低熵(可有效计算)功能提供给对手,它也保持安全性。适当选择参数可以使秘密密钥的长度的“泄漏率”为(1- o(1))。 -辅助输入安全性。即使将秘密密钥的任何足够难以反转(可有效计算)的功能提供给对手,它也将保持安全。我们的方案是第一个基于DCR和QR假设实现密钥相关安全性和辅助输入安全性的方案。实现这些特性的先前方案依赖于DDH或LWE假设。在QR假设下,提出的方案也是第一个实现秘密密钥长度的泄漏率(1- o(1))的泄漏弹性的方案。我们注意到,Naor和Segev的工作使用哈希证明系统隐含了DCR和QR假设下的泄漏弹性方案(对于安全质数的复合模积的受限情况)。但是,在QR假设下,已知的哈希证明系统构造仅会产生秘密密钥长度为o(1)的泄漏率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号