Paper 2015/772

Non-Malleable Encryption: Simpler, Shorter, Stronger

Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi

Abstract

In a seminal paper, Dolev et al. (STOC'91) introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. (CRYPTO'06) and by Choi et al. (TCC'08), the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: - Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? - Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? - Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the construction of Choi et al. by a factor O(k), where k is the security parameter. Still, encrypting a message of size O(k) would require ciphertext and keys of size O(k^2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a k-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(k) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural "encode-then-encrypt-bit-by-bit" approach to work. Finally, we introduce a new security notion for public-key encryption (PKE) that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results---(faster) construction from IND-CPA and domain extension from one-bit scheme---also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA security.

Note: Fixed a typo (pointed out by Sruthi Sekar) in the proof of Lemma 20.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A major revision of an IACR publication in TCC 2016
Keywords
Non-Malleable CodesPublic-Key EncryptionNon-Malleable Encryption
Contact author(s)
corettis @ nyu edu
History
2019-01-19: last of 6 revisions
2015-08-03: received
See all versions
Short URL
https://ia.cr/2015/772
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/772,
      author = {Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi},
      title = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
      howpublished = {Cryptology ePrint Archive, Paper 2015/772},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/772}},
      url = {https://eprint.iacr.org/2015/772}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.