Cryptology ePrint Archive: Report 2020/174

On Selective-Opening Security of Deterministic Primitives

Mohammad Zaheri and Adam O'Neill

Abstract: Classically, selective-opening attack (SOA) has been studied for randomized primitives, like randomized encryption schemes and commitments. The study of SOA for deterministic primitives, which presents some unique challenges, was initiated by Bellare et al. (PKC 2015), who showed negative results. Subsequently, Hoang et al. (ASIACRYPT 2016) showed positive results in the non-programmable random oracle model. Here we show the first positive results for SOA security of deterministic primitives in the standard (RO devoid) model. Our results are: \begin​{itemize} \item Any $2t$-wise independent hash function is SOA secure for an unbounded number of ``$t$-correlated'' messages, meaning any group of up to $t$ messages are arbitrarily correlated. \item An analogous result for deterministic encryption, from close variant of a NPROM scheme proposed by Hoang et al. \item We connect the one-more-RSA problem of Bellare et al. (J.~Cryptology 2003) to this context and demonstrate this problem is hard under the $\Phi$-Hiding Assumption with large enough encryption exponent. \end{itemize} Our results indicate that SOA for deterministic primitives in the standard model is more tractable than prior work would indicate.

Category / Keywords: public-key cryptography / Selective Opening Security, One-More RSA, Randomness Extractor, Deterministic Public-Key Encryption, Information Theoretic Setting

Date: received 13 Feb 2020

Contact author: mz394 at georgetown edu

Available format(s): PDF | BibTeX Citation

Version: 20200214:082105 (All versions of this report)

Short URL: ia.cr/2020/174


[ Cryptology ePrint archive ]