We extend the transformation paradigm presented by Naor and Segev that can transform from any chosen-plaintext secure public-key encryption (PKE) scheme to a chosen-plaintext weak key-leakage secure PKE scheme. Our extensions are two-fold. Firstly, we extend the paradigm into chosen-ciphertext attack scenarios and prove that the properties of it still hold in these scenarios. We also give an instantiation based on DDH assumption in this setting. Additionally, we extend the paradigm to cover more side channel attacks under the consideration of different types of leakage functions. We further consider attacks which require the secret key still has enough min-entropy after leaking and prove the original paradigm is still applicable in this case with chosen-ciphertext attacks. Attacks that require the secret key is computationally infeasible to recover given the leakage information are taken into consideration as well. And we formalize the informal discusses by Naor and Segev in (Crypto' 09) on how to adapt the original paradigm in this new models.
Category / Keywords: public-key cryptography / weak key-leakage attacks, public-key encryption scheme, chosen-ciphertext security Date: received 2 Mar 2014, last revised 3 Mar 2014 Contact author: yuzuoxia1990 at gmail com Available format(s): PDF | BibTeX Citation Version: 20140304:060749 (All versions of this report) Short URL: ia.cr/2014/159 Discussion forum: Show discussion | Start new discussion