## Cryptology ePrint Archive: Report 2012/473

Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited

Zhengan Huang and Shengli Liu and Baodong Qin

Abstract: In Eurocrypt 2010, Fehr et al. proposed the first sender equivocable encryption scheme secure against chosen-ciphertext attack (NC-CCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attack (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attack of a new primitive, cross-authentication code''. However, the security of cross-authentication code can not be guaranteed when all the keys used in the code are exposed. Our key observation is that in the NC-CCA security game, the randomness used in the generation of the challenge ciphertext is exposed to the adversary. This random information can be used to recover all the keys involved in cross-authentication code, and forge a ciphertext (like a substitution attack of cross-authentication code) that is different from but related to the challenge ciphertext. And the response of decryption oracle, with respect to the forged ciphertext, leaks information. This leaked information can be employed by an adversary to spoil the NC-CCA security proof of Fehr et al.'s scheme encrypting multi-bit plaintext.

In this paper, we provide a security analysis of Fehr et al.'s scheme, showing that its NC-CCA security proof is flawed by presenting an attack. We point out that Fehr et al.'s scheme encrypting single-bit plaintext can be refined to achieve NC-CCA security, free of cross-authentication code. We introduce the strong notion of cross-authentication code, apply it to Fehr et al.'s scheme, and show that the new version of Fehr et al.'s scheme achieves NC-CCA security for multi-bit plaintext.

Category / Keywords: public-key cryptography / sender equivocable encryption, chosen-ciphertext attack, cross-authentication code

Publication Info: The first version (20120818:035753) of this work will appear in PKC 2013.

Date: received 16 Aug 2012, last revised 27 Jan 2013

Contact author: hzayusuo5288 at sjtu edu cn

Available format(s): PDF | BibTeX Citation

Note: Added the notion of strong cross-authentication code, and utilized it to fix the NC-CCA security proof of Fehr et al.'s scheme.

Short URL: ia.cr/2012/473

[ Cryptology ePrint archive ]