We show how to build chosen ciphertext secure systems from DCCA security. We motivate our techniques by describing multiple examples of DCCA systems including creating them from 1-bit CCA secure encryption --- capturing the recent Myers-shelat result (FOCS 2009). Our work identifies DCCA as a new target for building CCA secure systems.
Category / Keywords: foundations / chosen ciphertext security, encryption Publication Info: Full version of paper in Eurocrypt 2012. Date: received 4 Jan 2012, last revised 16 May 2012 Contact author: susan at cs jhu edu Available formats: PDF | BibTeX Citation Note: Minor typos fixed. Version: 20120516:154741 (All versions of this report) Discussion forum: Show discussion | Start new discussion