首页> 外文会议>International coference on provable security >Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture
【24h】

Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture

机译:再谈针对选择的密文验证攻击的不可区分性:完整图片

获取原文

摘要

The knowledge that whether a purported ciphertext is valid or not may leak sufficient information to mount practical attacks on public key cryptosystem, e.g., Bleichenbacher's attack on RSA-PKCS#1, Hall-Goldberg-Schneier's "reaction attack" on both McEliece and Ajtai-Dwork cryptosystems. A notion called indistinguishability against chosen ciphertext verification attack (IND-CCVA) has been introduced in the literature, where the adversary has access to a chosen ciphertext verification oracle (not the full decryption oracle), to address those cryptographic functionalities where IND-CPA security is not sufficient and IND-CCA security is more than necessary. Some of the implications and separations between CPA, CCA and CCVA notions are known, while the rest are still open. In this paper we provide non-trivial constructions of schemes (existing/ new) to resolve all the open issues, thus providing a complete picture. We also introduce a slightly stronger attack, called Adaptive Chosen Ciphertext Decryption/Verification Attack (CCA 1.5), where the adversary gets an access to a decryption oracle in the first query phase and a ciphertext verification oracle in the second query phase. We argue that this attack is more realistic than usual CCA2 attack. In fact, it lies between CCA1 and CCA2 security as well as between CCVA2 and CCA2 security. In this regard, inter-relationships between the proposed CCA 1.5 notion with existing notions are established. Moreover, it is shown that any group homomorphic cryptosystem is CCA 1.5 under some reasonable assumption, thereby providing another motivation for studying this particular type of attack scenario.
机译:所谓的密文是否有效的知识可能会泄漏足够的信息,从而对公用密钥密码系统发起实际的攻击,例如,Bleeichenbacher对RSA-PKCS#1的攻击,Hall-Goldberg-Schneier对McEliece和Ajtai-的“反应攻击” Dwork密码系统。文献中引入了一种针对所选密文验证攻击的不可区分性(IND-CCVA)的概念,在这种情况下,对手可以访问所选密文验证预言家(而不是完整的解密预言家),以解决IND-CPA安全的加密功能不够,IND-CCA安全性已超出必要。 CPA,CCA和CCVA概念之间的某些含义和区别是已知的,而其余的概念尚不明确。在本文中,我们提供了解决方案(现有/新的)的非平凡构造,以解决所有未解决的问题,从而提供了一个完整的图景。我们还引入了一种稍微强一些的攻击,称为“自适应选择密文解密/验证攻击(CCA 1.5)”,在此攻击中,对手在第一个查询阶段可以访问解密预言,而在第二个查询阶段可以使用密文验证预言。我们认为这种攻击比通常的CCA2攻击更为现实。实际上,它位于CCA1和CCA2安全性之间以及CCVA2和CCA2安全性之间。在这方面,建立了建议的CCA 1.5概念与现有概念之间的相互关系。而且,表明在某种合理的假设下,任何组同态密码系统都是CCA 1.5,从而为研究这种特殊类型的攻击情形提供了另一种动机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号