Cryptology ePrint Archive: Report 2016/829

Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions

Shuai Han and Shengli Liu and Lin Lyu

Abstract: KDM$[\mathcal{F}]$-CCA secure public-key encryption (PKE) protects the security of message $f(sk)$, with $f \in \mathcal{F}$, that is computed directly from the secret key, even if the adversary has access to a decryption oracle. An efficient KDM$[\mathcal{F}_{\text{aff}}]$-CCA secure PKE scheme for affine functions was proposed by Lu, Li and Jia (LLJ, EuroCrypt2015). We point out that their security proof cannot go through based on the DDH assumption.

In this paper, we introduce a new concept _Authenticated Encryption with Auxiliary-Input_ $\mathsf{AIAE}$ and define for it new security notions dealing with related-key attacks, namely _IND-RKA security_ and _weak INT-RKA security_. We also construct such an $\mathsf{AIAE}$ w.r.t. a set of restricted affine functions from the DDH assumption. With our $\mathsf{AIAE}$,

-- we construct the first efficient KDM$[\mathcal{F}_{\text{aff}}]$-CCA secure PKE w.r.t. affine functions with compact ciphertexts, which consist only of a constant number of group elements;

-- we construct the first efficient KDM$[\mathcal{F}_{\text{poly}}^d]$-CCA secure PKE w.r.t. polynomial functions of bounded degree $d$ with almost compact ciphertexts, and the number of group elements in a ciphertext is polynomial in $d$, independent of the security parameter.

Our PKEs are both based on the DDH & DCR assumptions, free of NIZK and free of pairing.

Category / Keywords: public-key cryptography / public-key encryption, key-dependent messages, chosen-ciphertext security, authenticated encryption, related-key attack

Original Publication (with major differences): IACR-ASIACRYPT-2016

Date: received 26 Aug 2016, last revised 8 Sep 2016

Contact author: dalen17 at sjtu edu cn

Available format(s): PDF | BibTeX Citation

Version: 20160909:022430 (All versions of this report)

Short URL: ia.cr/2016/829

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]