Paper 2016/845
Selective Opening Security from Simulatable Data Encapsulation
Felix Heuer and Bertram Poettering
Abstract
The confidentiality notion of security against selective opening attacks considers adver- saries that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing the encrypted message and the randomness used to encrypt. The SO notion is stronger than that of CCA security and is often required when formally arguing towards the security of multi-user applications. While different ways of achieving correspondingly secure schemes are known, as they generally employ expensive asymmetric building blocks like lossy trapdoor functions or lossy en- cryption, such constructions are routinely left aside by practitioners and standardization bodies. So far, formal arguments towards the SO security of schemes used in practice (e.g., for email encryption) are not known. In this work we shift the focus from the asymmetric to the symmetric building blocks of PKE and prove the following statement: If a PKE scheme is composed of a key encapsulation mechanism (KEM) and a blockcipher-based data encapsulation mechanism (DEM), and the DEM meets spe- cific combinatorial properties, then the PKE scheme offers SO security, in the ideal cipher model. Fortunately, as we show, the required properties hold for popular modes of operation like CTR, CBC, CCM, and GCM. This paper not only establishes the corresponding theoretical framework of analysis, but also contributes very concretely to practical cryptography by concluding that selective opening security is given for many real-world schemes.
Note: An extended abstract of this paper appears in the proceedings of ASIACRYPT 2016. This is the full version.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2016
- Keywords
- selective openinghybrid encryptionmode of operationCTRCBCCCMGCM
- Contact author(s)
- felix heuer @ rub de
- History
- 2016-09-06: received
- Short URL
- https://ia.cr/2016/845
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/845, author = {Felix Heuer and Bertram Poettering}, title = {Selective Opening Security from Simulatable Data Encapsulation}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/845}, year = {2016}, url = {https://eprint.iacr.org/2016/845} }