Paper 2024/1686

Circular Insecure Encryption: from Long Cycles to Short Cycles

Zehou Wu, University of Victoria
Abstract

We prove that the existence of a CPA-secure encryption scheme that is insecure in the presence of key cycles of length n implies the existence of such a scheme for key cycles of any length less than n. Equivalently, if every encryption scheme in a class is n-circular secure and this class is closed under our construction, then every encryption scheme in this class is n-circular secure for n>n.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Preprint.
Keywords
circular encryptionblack boxcounter example
Contact author(s)
wuzehouw @ uvic ca
History
2024-10-18: approved
2024-10-16: received
See all versions
Short URL
https://ia.cr/2024/1686
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1686,
      author = {Zehou Wu},
      title = {Circular Insecure Encryption: from Long Cycles to Short Cycles},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1686},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1686}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.