First we study the relation between two existing security definitions, one based on simulation and the other based on indistinguishability, and show that the former is strictly stronger. We continue with feasibility results for both notions which we show can be achieved from (variants of) non-committing encryption schemes. In particular, we show that indistinguishability-based SO security can be achieved from a tweaked variant of non-committing encryption which, in turn, can be instantiated from a variety of basic, well-established, assumptions. We conclude our study by showing that SO security is however strictly weaker than all variants of non-committing encryption that we consider, leaving potentially more efficient constructions as an interesting open problem.
Category / Keywords: public-key cryptography / Selective Opening Attacks, Encryption Schemes, Non-committing Encryption Original Publication (with major differences): IACR-ASIACRYPT-2015 Date: received 5 Sep 2015, last revised 14 Sep 2015 Contact author: arpitapatra10 at gmail com, carmit hazay@gmail com, bogdan@compsci bristol ac uk Available format(s): PDF | BibTeX Citation Version: 20150915:051755 (All versions of this report) Short URL: ia.cr/2015/860 Discussion forum: Show discussion | Start new discussion