ECCC-Report TR01-072https://eccc.weizmann.ac.il/report/2001/072Comments and Revisions published for TR01-072en-usWed, 12 Dec 2001 00:00:00 +0200
Revision 1
| |
Ronald Cramer,
Victor Shoup,
Victor Shoup
https://eccc.weizmann.ac.il/report/2001/072#revision1Wed, 12 Dec 2001 00:00:00 +0200https://eccc.weizmann.ac.il/report/2001/072#revision1
Revision 2
| Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Revision of: TR01-072 |
Ronald Cramer,
Victor Shoup
https://eccc.weizmann.ac.il/report/2001/072#revision2We present several new and fairly practical public-key encryption
schemes and prove them secure against
adaptive chosen ciphertext attack. One scheme is based on Paillier's
Decision Composite Residuosity (DCR) assumption,
while another is based in the classical Quadratic Residuosity (QR)
assumption. The analysis is in the standard cryptographic
model, i.e., the security of our schemes does not rely on the Random
Oracle model.
We also introduce the notion of a universal hash proof system.
Essentially, this is a special kind of non-interactive
zero-knowledge proof system for an NP language. We do not show that
universal hash proof systems exist for all NP
languages, but we do show how to construct very efficient universal
hash proof systems for a general class of
group-theoretic language membership problems.
Given an efficient universal hash proof system for a language with
certain natural cryptographic indistinguishability
properties, we show how to construct an efficient public-key encryption schemes secure against adaptive chosen ciphertext
attack in the standard model. Our construction only uses the universal
hash proof systemas a primitive: no other primitives
are required, although even more efficient encryption schemes can be
obtained by using hash functions with appropriate
collision-resistance properties. We show how to construct efficient
universal hash proof systems for languages related to
the DCR and QR assumptions. From these we get corresponding public-key
encryption schemes that are secure under these
assumptions. We also show that the Cramer-Shoup encryption scheme
(which up until now was the only practical
encryption scheme that could be proved secure against adaptive chosen
ciphertext attack under a reasonable assumption,
namely, the Decision Diffie-Hellman assumption) is also a special case
of our general theory.
Wed, 12 Dec 2001 00:00:00 +0200https://eccc.weizmann.ac.il/report/2001/072#revision2
Paper TR01-072
| Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption |
Ronald Cramer,
Victor Shoup
https://eccc.weizmann.ac.il/report/2001/072We present several new and fairly practical public-key encryption
schemes and prove them secure against
adaptive chosen ciphertext attack. One scheme is based on Paillier's
Decision Composite Residuosity (DCR) assumption,
while another is based in the classical Quadratic Residuosity (QR)
assumption. The analysis is in the standard cryptographic
model, i.e., the security of our schemes does not rely on the Random
Oracle model.
We also introduce the notion of a universal hash proof system.
Essentially, this is a special kind of non-interactive
zero-knowledge proof system for an NP language. We do not show that
universal hash proof systems exist for all NP
languages, but we do show how to construct very efficient universal
hash proof systems for a general class of
group-theoretic language membership problems.
Given an efficient universal hash proof system for a language with
certain natural cryptographic indistinguishability
properties, we show how to construct an efficient public-key encryption schemes secure against adaptive chosen ciphertext
attack in the standard model. Our construction only uses the universal
hash proof systemas a primitive: no other primitives
are required, although even more efficient encryption schemes can be
obtained by using hash functions with appropriate
collision-resistance properties. We show how to construct efficient
universal hash proof systems for languages related to
the DCR and QR assumptions. From these we get corresponding public-key
encryption schemes that are secure under these
assumptions. We also show that the Cramer-Shoup encryption scheme
(which up until now was the only practical
encryption scheme that could be proved secure against adaptive chosen
ciphertext attack under a reasonable assumption,
namely, the Decision Diffie-Hellman assumption) is also a special case
of our general theory.
Thu, 25 Oct 2001 00:06:42 +0200https://eccc.weizmann.ac.il/report/2001/072