Paper 2014/866
Self-Destruct Non-Malleability
Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi
Abstract
=== NOTE: This submission has been replaced by a corrected version (2015/772). ===
We introduce a new security notion for public-key encryption (PKE) that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA), which appears to be the strongest natural PKE security notion below full-blown chosen-ciphertext (IND-CCA) security. In this notion, the adversary is allowed to ask many adaptive ``parallel'' decryption queries (i.e., a query consists of many ciphertexts) up to the point when the first invalid ciphertext is submitted. As such, NM-SDA security generalizes non-malleability against chosen plaintext attacks (NM-CPA, where only one parallel decryption query is allowed) and recently introduced indistinguishability against (chosen-ciphertext) self-destruct attacks (IND-SDA, where each adaptive query consists of a single ciphertext). After showing that NM-SDA is a {\em strict} strengthening of NM-CPA and IND-SDA and allows for more applications, we establish the following two results:
Domain Extension: For any
Metadata
- Available format(s)
- -- withdrawn --
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Pulbic-Key EncryptionNon-Malleable CodesDomain-Extension
- Contact author(s)
- corettis @ inf ethz ch
- History
- 2015-08-03: withdrawn
- 2014-10-22: received
- See all versions
- Short URL
- https://ia.cr/2014/866
- License
-
CC BY