Cryptology ePrint Archive: Report 2016/174

Honey Encryption Beyond Message Recovery Security

Joseph Jaeger and Thomas Ristenpart and Qiang Tang

Abstract: Juels and Ristenpart introduced honey encryption (HE) and showed how to achieve message recovery security even in the face of attacks that can exhaustively try all likely keys. This is important in contexts like password-based encryption where keys are very low entropy, and HE schemes based on the JR construction were subsequently proposed for use in password management systems and even long-term protection of genetic data. But message recovery security is in this setting, like previous ones, a relatively weak property, and in particular does not prohibit an attacker from learning partial information about plaintexts or from usefully mauling ciphertexts.

We show that one can build HE schemes that can hide partial information about plaintexts and that prevent mauling even in the face of exhaustive brute force attacks. To do so, we introduce target-distribution semantic-security and target-distribution non-malleability security notions and proofs that a slight variant of the JR HE construction can meet them. The proofs require new balls-and-bins type analyses significantly different from those used in prior work. Finally, we provide a formal proof of the folklore result that an unbounded adversary which obtains a limited number of encryptions of known plaintexts can always succeed at message recovery.

Category / Keywords: secret-key cryptography /

Original Publication (with minor differences): IACR-EUROCRYPT-2016

Date: received 20 Feb 2016, last revised 23 Feb 2016

Contact author: qtang84 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20160223:081351 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]