Cryptology ePrint Archive: Report 2016/868

Selective-Opening Security in the Presence of Randomness Failures

Viet Tung Hoang and Jonathan Katz and Adam OíNeill and Mohammad Zaheri

Abstract: We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality randomness. In the SOA setting, an adversary can adaptively corrupt senders; this notion is natural to consider in tandem with randomness failures since an adversary may target senders by multiple means.

Concretely, we first treat SOA security of nonce-based PKE. After formulating an appropriate definition of SOA- secure nonce-based PKE,we provide efficient constructions in the non-programmable random-oracle model, based on lossy trapdoor functions.

We then lift our notion of security to the setting of "hedged" PKE, which ensures security as long as the sender's seed, message, and nonce jointly have high entropy. This unifies the notions and strengthens the protection that nonce-based PKE provides against randomness failures even in the non-SOA setting.We lift our definitions and constructions of SOA-secure nonce-based PKE to the hedged setting as well.

Category / Keywords: selective-opening security, deterministic encryption, nonce-based PKE

Original Publication (with minor differences): IACR-ASIACRYPT-2016

Date: received 6 Sep 2016, last revised 6 Sep 2016

Contact author: mz394 at georgetown edu

Available format(s): PDF | BibTeX Citation

Version: 20160910:154520 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]