CORC  > 北京大学  > 数学科学学院
Separations in circular security for arbitrary length key cycles, revisited
Chang, Jinyong ; Dai, Honglong ; Xu, Maozhi ; Xue, Rui
2016
关键词circular security CCA security hybrid encryption KEM MAC indistinguishability obfuscation ENCRYPTION
英文摘要The circular security of public key encryptions has been drawn great attentions in recent years. The relationship of notions between circular securities and standard ones such as chosen plaintext security (CPA-security) and chosen ciphertext security (CCA-security) deserve to be clarified. For any integer n>0 and n2, whether the notions of n-circular securities can be implied by that of their standard correspondences, such as CPA or CCA security in public key setting, has largely remained open. Koppula, Ramchen, and Waters in TCC'15 recently made a separation in CPA case by proposing a CPA secure scheme that is not n-circular secure based on the recent candidate constructions of indistinguishable obfuscation. In this work, we consider the CCA case. In particular, inspired by the indistinguishable-obfuscation-based construction of Koppula et al., we obtain the following results: We make a separation between the n-circular CCA security and CCA security for anyn>0. Specifically, we propose a hybrid encryption scheme that achieves the CCA security but fails even in the n-circular CPA security. Hence, that makes a separation between the CCA security and the n-circular CCA security (and even the n-circular CPA security). By revising the previous construction, we also present a CCA secure (hybrid encryption) scheme, which allows an adversary to recover all secret keys when obtaining an encrypted key cycle. Hence, that implies that: if a key cycle arises in a system, then a passive adversary might be able to recover all secret keys even if CCA-secure encryptions are used. The results in this work, together with that of Koppula et al., confirm that notions of circular securities are stronger than their standard correspondences. Copyright (C) 2016 John Wiley & Sons, Ltd.; National Natural Science Foundation of China [61472414, 61602061, 61402471, 61672059, 61272499]; Strategic Priority Research Program of Chinese Academy of Sciences [XDA06010701]; Foundation of Institute of Information Engineering for Cryptography; SCI(E); ARTICLE; 18; 5392-5400; 9
语种英语
出处SCI
出版者SECURITY AND COMMUNICATION NETWORKS
内容类型其他
源URL[http://hdl.handle.net/20.500.11897/476565]  
专题数学科学学院
推荐引用方式
GB/T 7714
Chang, Jinyong,Dai, Honglong,Xu, Maozhi,et al. Separations in circular security for arbitrary length key cycles, revisited. 2016-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace