400 likes | 567 Views
A New Paradigm of Hybrid Encryption Scheme. Kaoru Kurosawa , Ibaraki Univ. Yvo Desmedt , UCL and FSU. C=E( m ). C i ≠C. Decryption Oracle. Adversary. m i. m ??. Chosen Ciphertext Attack. PKE is “IND-CCA”. Cramer-Shoup scheme. The 1 st practical IND-CCA PKE
E N D
A New Paradigm of Hybrid Encryption Scheme Kaoru Kurosawa, Ibaraki Univ. Yvo Desmedt, UCL and FSU
C=E(m) Ci ≠C Decryption Oracle Adversary mi m ?? Chosen Ciphertext Attack PKE is “IND-CCA”
Cramer-Shoup scheme • The 1st practical IND-CCA PKE in the standard model • Based on Decisional Diffie-Hellman (DDH) assumption (’98) • Generalized to Projective hash families (’02)
Hybrid Encryption • Typically, E(m) = (PKE(K), SKE(K, m)) • If ElGamal, PKE(K) = (gr, K・yr) • More efficiently, PKE part = gr only K = yr
Key Encapsulation Mechanism(KEM) • The PKE part (PKE(K) or gr) is formalized as KEM by Shoup • CCA-security notion of KEM is also formalizedby Shoup
CCA security of KEM KEM (=PKE(K) or gr) KEMi ≠KEM Decryption Oracle Adversary Ki K ?? KEM is “IND-CCA”
Security of Hybrid Encryption • IND-CCA KEM + IND-CCA SKE IND-CCA Hybrid Encryption scheme
In the standard model • Shoup showed IND-CCA KEM (by using Cramer-Shoup PKE) • As a result, his hybrid encryption scheme is IND-CCA under the DDH assumption
Previously, • It has been believed that KEM must be IND-CCA to obtain IND-CCA Hybrid encryption schemes
In this paper, • We disprove this belief • KEM does not have to be IND-CCA
Discussion • In IND-CCA hybrid encryption, the Dec. oracle returns a message m • In IND-CCA KEM, the Dec. oracle returns a key K of SKE, reveals more information than m CCA-security of KEM is too demanding
Proposed Hybrid Encryption • More efficient than Shoup’s because KEM≠IND-CCA • Nevertheless, it is IND-CCA under the DDH assumption in the standard model.
The only (conceptual) cost • SKE must be ε-rejection secure PrK (any fixed string is rejected) > 1-ε • This property is already satisfied by the SKE which is used in the hybrid construction of Shoup
Proposed scheme • Public-key • Private-key x1, x2, y1, y2
Encryption • r ← random u1 = g1r, u2 = g2r, χ= SKE(K, m) • where v = cr ・drα with α= UOWH(u1, u2) K = H(v) • The ciphertext is (u1, u2, χ) KEM
Comparison of KEM KEM Invalid-KEM Proposed (u1, u2) rejected by SKE Shoup (u1, u2, v) rejected by v • Our KEM ≠IND-CCA and more efficient • Our v is used to generate K of SKE
Decryption of our scheme • For C = (u1, u2, χ), compute α = UOWH(u1, u2), K = H(v) • Decrypt χ under the key K by SKE (Invalid C is rejected by ε-rejection security ofour SKE)
Theorem • The proposed hybrid encryption scheme is IND-CCA under the DDH assumption in the standard model if SKE is IND-CCA and ε-rejection secure
DDH assumption • Let G be a group of a prime order q • Then (g1, g2, g1r, g2r) and (g1, g2, g1r, g2s) are indistinguishable, where r and s are random
Assumption on H • If v is uniformly distributed over G, then K = H(v) is uniformly distributed over {0,1}k, where k is the key-size of SKE • H(v) can be pseudorandom. (Gennaro and Shoup)
One-Time SKE • One-Time SKE is enough for hybrid encryption • In the Def. of IND-CCA, A has access to Dec. oracle only after being given a challenge ciphertext χ
Construction of OT-SKE(Shoup) • For a key K = (K0,K1,K2), let e = PRBG(K0) + m, tag = AXUH(K1,e) + K2 The ciphertext is χ= (e, tag) • This scheme is alreadyε-rejection secure PrK (χ is rejected) > 1-ε because K2 is random ・MAC can be used (Gennaro and Shoup)
Efficiency Comparison with Shoup’s hybrid encryption • Ciphertext is 1 group element shorter • Public-key is also 1 group element shorter • Private-key is |q|-bits shorter • Encryption/Decryption needs 1 exponentiation lesser where we assume H(v) is pseudorandom
Generalization • Cramer and Shoup introduced ε-universal2 Projective Universal Hash (PUH) families • We define a variant, strongly universal2 PUH families
Strongly universal2 • A private-key (x1, x2, y1, y2) is randomly chosen in such a way that • The public-key is • The freedom is 4 – 2 = 2 • We consider the above probability space
(In)Valid KEM • We say that (u1, u2) = (g1r, g2r) is valid and (u1, u2) = (g1r, g2s) is invalid
Decryption of KEM • For (u1, u2) , compute K = H(v), with α = UOWH(u1, u2) • Consider F such that F(u1, u2) = v
Requirement on F • If (u1, u2) is valid, v is uniquely determined by the pk • If (u1, u2) and (u1’, u2’) are both invalid, v and v’ are independently random We say F is Strongly universal2 • Our F is Strongly universal2 since Freedom=2.
Generalized Hybrid Encryption • Our hybrid encryption scheme can be generalized to strongly universal2 PUH families • Concrete schemes can be based on • Quadratic Residuosity assumption • Paillier’s Decision Composite Residuosity assumption
Security proof • Adversary is given a challenge ciphertext (u1, u2, χ(m)) • Replace (u1, u2) by invalid (u1’, u2’) and χ(m) by χ’ = SKE(random K’, m) • (u1, u2, χ) ~(u1’, u2’, χ’) from DDH assump. and strongly universal2
Chosen Ciphertext Attack (u1’, u2’, χ’) (u1, u2,χ)i Decryption Oracle Adversary mi m ??
Dec. query (u1, u2, χ)i • (Type 1) Valid • (Type 2) Invalid and (u1, u2)i = (u1’, u2’) • (Type 3) Invalid and (u1, u2)i ≠ (u1’, u2’)
In Type 3 query • Ki = H(vi) is random because v’ and v_i are independently random from strongly universal_2 • Since Ki is random, χi is reject by SKE with high prob. because our SKE is ε-rejection secure
In Type 2 query • (u1, u2)i = (u1’, u2’) • In this case, χi is decrypted by the same K’ that is used in the challenge ciphertext E’
To summarize, • Type 3 query is rejected • Type 2 query is decrypted by K’ • Type 1 (valid) query is decrypted in the normal way • Consequently, the CCA-attack is reduced to a CCA-attack on SKE as follows
CCA attack on SKE χ’ = SKE(K’, m) χi = SKE(K’, mi) Decryption Oracle Adversary mi m ??
Finally, • Our SKE is CCA-secure • Our hybrid encryption scheme is CCA-secure Q.E.D.
Summary • KEM does not have to be IND-CCA • Our hybrid encryption scheme is more efficient than Shoup’s • Can be generalized to PUH families • Our schemes are IND-CCA in the standard model
Open problem • Can we formalize a weaker condition on KEM than IND-CCA? • It seems impossible because the security of KEM and that of SKE are intertwined (as in our scheme)