Paper 2013/683
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula, Kim Ramchen, and Brent Waters
Abstract
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ciphertexts Enc(pk1, sk2), Enc(pk2, sk3), ..., Enc(pkn, sk1) should be indistinguishable from encryptions of zero. In this work we prove the following results for n-circular security, based upon recent candidate constructions of indistinguishability obfuscation [GGH+ 13b, CLT13]: - For any n there exists an encryption scheme that is IND-CPA secure but not n-circular secure. - There exists a bit encryption scheme that is IND-CPA secure, but not 1-circular secure. - If there exists an encryption system where an attacker can distinguish a key encryption cycle from an encryption of zeroes, then in a transformed cryptosystem there exists an attacker which recovers secret keys from the encryption cycles. Our last result is generic and applies to any such cryptosystem.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Contact author(s)
- kramchen @ cs utexas edu
- History
- 2014-06-02: last of 2 revisions
- 2013-10-24: received
- See all versions
- Short URL
- https://ia.cr/2013/683
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/683, author = {Venkata Koppula and Kim Ramchen and Brent Waters}, title = {Separations in Circular Security for Arbitrary Length Key Cycles}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/683}, year = {2013}, url = {https://eprint.iacr.org/2013/683} }