Paper 2022/1176
Anonymous Public Key Encryption under Corruptions
Abstract
Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys are used to generate them. Corruptions are common threats in the multi-user scenario but anonymity of PKE under corruptions is less studied in the literature. In TCC 2020, Benhamouda et al. first provide a formal characterization for anonymity of PKE under a specific type of corruption. However, no known PKE scheme is proved to meet their characterization. To the best of our knowledge, all the PKE application scenarios which require anonymity also require confidentiality. However, in the work by Benhamouda et al., different types of corruptions for anonymity and confidentiality are considered, which can cause security pitfalls. What's worse, we are not aware of any PKE scheme which can provide both anonymity and confidentiality under the same types of corruptions. In this work, we introduce a new security notion for PKE called ANON-RSO$_k\&$C security, capturing anonymity under corruptions. We also introduce SIM-RSO$_k\&$C security which captures confidentiality under the same types of corruptions. We provide a generic framework of constructing PKE scheme which can achieve the above two security goals simultaneously based on a new primitive called key and message non-committing encryption (KM-NCE). Then we give a general construction of KM-NCE utilizing a variant of hash proof system (HPS) called Key-Openable HPS. We also provide Key-Openable HPS instantiations based on the matrix decisional Diffie-Hellman assumption. Therefore, we can obtain various concrete PKE instantiations achieving the two security goals in the standard model with compact ciphertexts. Furthermore, for some PKE instantiation, its security reduction is tight.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2022
- Keywords
- public-key encryption multi-user security anonymity receiver selective opening adaptive user corruption
- Contact author(s)
-
zhahuang sjtu @ gmail com
laijunzuo @ gmail com
dalen17 @ sjtu edu cn
lin lyu @ uni-wuppertal de
cryptjweng @ gmail com - History
- 2022-09-09: approved
- 2022-09-08: received
- See all versions
- Short URL
- https://ia.cr/2022/1176
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1176, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, title = {Anonymous Public Key Encryption under Corruptions}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1176}, year = {2022}, url = {https://eprint.iacr.org/2022/1176} }