### A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

Jan Camenisch, Nishanth Chandran, and Victor Shoup

##### Abstract

Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the long-standing open problem of circular encryption,'' by presenting a public key encryption scheme and proving that it is semantically secure against key dependent chosen plaintext attack (KDM-CPA security) under standard assumptions (and without resorting to random oracles). However, they left as an open problem that of designing an encryption scheme that \emph{simultaneously} provides security against both key dependent chosen plaintext \emph{and} adaptive chosen ciphertext attack (KDM-CCA2 security). In this paper, we solve this problem. First, we show that by applying the Naor-Yung double encryption'' paradigm, one can combine any KDM-CPA secure scheme with any (ordinary) CCA2 secure scheme, along with an appropriate non-interactive zero-knowledge proof, to obtain a KDM-CCA2 secure scheme. Second, we give a concrete instantiation that makes use the above KDM-CPA secure scheme of BHHO, along with a generalization of the Cramer-Shoup CCA2 secure encryption scheme, and recently developed pairing-based NIZK proof systems. This instantiation increases the complexity of the BHHO scheme by just a small constant factor.

Available format(s)
Publication info
Published elsewhere. To appear, Eurocrypt 2009
Keywords
public key encryptionkey dependent messagescircular encryptionchosen ciphertext attack
Contact author(s)
shoup @ cs nyu edu
History
2009-01-16: last of 3 revisions
See all versions
Short URL
https://ia.cr/2008/375

CC BY

BibTeX

@misc{cryptoeprint:2008/375,
author = {Jan Camenisch and Nishanth Chandran and Victor Shoup},
title = {A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks},
howpublished = {Cryptology ePrint Archive, Paper 2008/375},
year = {2008},
note = {\url{https://eprint.iacr.org/2008/375}},
url = {https://eprint.iacr.org/2008/375}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.