Skip to main content

On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2384))

Included in the following conference series:

Abstract

Recently various public key encryption schemes such as DHIES by Abdalla, Bellare and Rogaway and REACT by Okamoto and Pointcheval, whose security against adaptive chosen ciphertext attack (CCA) is based on the Gap problems, have been proposed. Although the Gap problems were proved to be a sufficient assumption for those schemes to be secure against adaptive chosen-cipertext attack, a necessary condition for CCA security of those schemes has not been explicitly discussed.

In this paper we clarify the necessary condition for CCA security of those schemes. Namely we prove (in the random oracle model) that the Gap Diffie-Hellman is not only sufficient, but also a necessary assumption for the CCA security of DHIES and Diffie-Hellman version of REACT. We also show that our result applies to a wider class of public key encryption schemes. Furthermore we show that our result implies the equivalence, in the random oracle model, between ‘Strong Diffie-Hellman’ and ‘Oracle Diffie-Hellman’ assumptions proposed by Abdalla, Bellare and Rogaway. Our results may be used as criteria for distinguishing public key encryption schemes whose CCA security is based on strong assumptions (such as Gap Diffie-Hellman) from those schemes based on weaker ones (such as Computational Diffie-Hellman).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations Among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology-Proceedings of CRYPTO’ 98, volume 1462 of LNCS, pages 26–45, Berlin, 1998. Springer-Verlag.

    Chapter  Google Scholar 

  2. M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In Proceedings of First ACM Conference on Computer and Communications Security, pages 62–73. ACM, 1993.

    Google Scholar 

  3. M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Information and Communications Security, volume 1334 of LNCS, pages 1–16, Berlin, 1997. Springer-Verlag.

    Chapter  Google Scholar 

  4. M. Bellare M. Abdalla and P. Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In Topics in Cryptology-CT-RSA 2001, volume 2020 of LNCS, pages 143–158, Berlin, 2001. Springer-Verlag. See full paper available at www-cse.ucsd.edu/users/mihir.

    Google Scholar 

  5. T. Okamoto and D. Pointcheval. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform. In Topics in Cryptology-CT-RSA 2001, volume 2020 of LNCS, pages 159–174, Berlin, 2001. Springer-Verlag.

    Chapter  Google Scholar 

  6. Y. Zheng and J. Seberry. Immunizing public key cryptosystems against chosen ciphertext attacks. In the Special Issue on Secure Communications, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, pages 715–724.

    Article  Google Scholar 

  7. V. Shoup. A Proposal for an ISO Standard for Public Key Encryption (Cersion 1.1). ISO/IEC JTC 1/SC 27, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Steinfeld, R., Baek, J., Zheng, Y. (2002). On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-45450-0_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43861-8

  • Online ISBN: 978-3-540-45450-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics