Paper 2016/845

Selective Opening Security from Simulatable Data Encapsulation

Felix Heuer and Bertram Poettering

Abstract

The confidentiality notion of security against selective opening attacks considers adver- saries that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing the encrypted message and the randomness used to encrypt. The SO notion is stronger than that of CCA security and is often required when formally arguing towards the security of multi-user applications. While different ways of achieving correspondingly secure schemes are known, as they generally employ expensive asymmetric building blocks like lossy trapdoor functions or lossy en- cryption, such constructions are routinely left aside by practitioners and standardization bodies. So far, formal arguments towards the SO security of schemes used in practice (e.g., for email encryption) are not known. In this work we shift the focus from the asymmetric to the symmetric building blocks of PKE and prove the following statement: If a PKE scheme is composed of a key encapsulation mechanism (KEM) and a blockcipher-based data encapsulation mechanism (DEM), and the DEM meets spe- cific combinatorial properties, then the PKE scheme offers SO security, in the ideal cipher model. Fortunately, as we show, the required properties hold for popular modes of operation like CTR, CBC, CCM, and GCM. This paper not only establishes the corresponding theoretical framework of analysis, but also contributes very concretely to practical cryptography by concluding that selective opening security is given for many real-world schemes.

Note: An extended abstract of this paper appears in the proceedings of ASIACRYPT 2016. This is the full version.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
A minor revision of an IACR publication in ASIACRYPT 2016
Keywords
selective openinghybrid encryptionmode of operationCTRCBCCCMGCM
Contact author(s)
felix heuer @ rub de
History
2016-09-06: received
Short URL
https://ia.cr/2016/845
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/845,
      author = {Felix Heuer and Bertram Poettering},
      title = {Selective Opening Security from Simulatable Data Encapsulation},
      howpublished = {Cryptology ePrint Archive, Paper 2016/845},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/845}},
      url = {https://eprint.iacr.org/2016/845}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.