Paper 2022/1176
Anonymous Public Key Encryption under Corruptions
Abstract
Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys are used to generate them. Corruptions are common threats in the multi-user scenario but anonymity of PKE under corruptions is less studied in the literature. In TCC 2020, Benhamouda et al. first provide a formal characterization for anonymity of PKE under a specific type of corruption. However, no known PKE scheme is proved to meet their characterization.
To the best of our knowledge, all the PKE application scenarios which require anonymity also require confidentiality. However, in the work by Benhamouda et al., different types of corruptions for anonymity and confidentiality are considered, which can cause security pitfalls. What's worse, we are not aware of any PKE scheme which can provide both anonymity and confidentiality under the same types of corruptions.
In this work, we introduce a new security notion for PKE called ANON-RSO
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2022
- Keywords
- public-key encryption multi-user security anonymity receiver selective opening adaptive user corruption
- Contact author(s)
-
zhahuang sjtu @ gmail com
laijunzuo @ gmail com
dalen17 @ sjtu edu cn
lin lyu @ uni-wuppertal de
cryptjweng @ gmail com - History
- 2022-09-09: approved
- 2022-09-08: received
- See all versions
- Short URL
- https://ia.cr/2022/1176
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1176, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, title = {Anonymous Public Key Encryption under Corruptions}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1176}, year = {2022}, url = {https://eprint.iacr.org/2022/1176} }