110 likes | 226 Views
Compact CCA-Secure Encryption for Messages of Arbitrary Length. Presentation By: D. Vamsi Krishna CS09B006. A NEW SCHEME [AKO07]. Ciphertext:. Best CTO (as short as ElGamal’s). Can encrypt arbitrary message. Details. Key pair:. Hash:. Encryption:. Decryption:. ENCRYPTION (DIAGRAM).
E N D
Compact CCA-Secure Encryption for Messages of Arbitrary Length Presentation By: D. Vamsi Krishna CS09B006
A NEW SCHEME [AKO07] Ciphertext: Best CTO (as short as ElGamal’s) Can encrypt arbitrary message.
Details Key pair: Hash: Encryption: Decryption:
Comparison* Comparison in typical 80-bit security setting over elliptic curve group. 1 multi-base exponentiation is counted as 1.2 single-base exponentiation. Costs for trivial computations are ignored. Hashing a (potentially long) message is counted. * Personal Communication with Masayuki Abe
CCA Attack • The Challenger ( C ) generates a public key/secret key pair, and gives public key to Adversary (A). • A makes a number of decryption queries to the challenger. • A makes one challenge query !! • A makes more decryption queries. • A predicts a or b. A sends messages (a, b) to C, C chooses a or b at random, encrypts (d)and sends back He shouldn’t obviously ask for decryption of d
Proof Highlight • Reduction to Gap-DH (outline) • Given , • set public-key to • set . • Simulate the decryption oracle by using gap-DH oracle. • Given challenge , • set , • define , • return challenge ciphertext . • If A asks to H, then output the query.
Reference(s) • Compact CCA-Secure Encryption for Messages of Arbitrary Length – Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto • Personal Communication with Masayuki Abe.