Abstract
In this paper we present a new notion of indistinguishability of encryptions that is proven equivalent to ind-cpa-security and separates the encryptions from whatever partial information about the plaintexts accompanies them. We then proceed to show its use in an authentication scheme setting.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bellare, M., Boldyreva, A., Micali, S.: Public-key Encryption in a Multi-user Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–46. Springer, Heidelberg (1998)
Bringer, J., Chabanne, H., Izabachène, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96–106. Springer, Heidelberg (2007)
Bringer, J., Chabanne, H.: An Authentication Protocol with Encrypted Biometric Data. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 109–124. Springer, Heidelberg (2008)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science, pp. 41–50. IEEE, New York (1995)
Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-Key Encryption Schemes with Auxiliary Inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361–381. Springer, Heidelberg (2010)
Dodis, Y., Kalai, Y., Lovett, S.: On Cryptography with Auxiliary Input. In: STOC, pp. 621–630 (2009)
Fournel, T., Coltuc, D., Becker, J.-M., Boutant, Y.: Multiscale extraction of uncompressive bitstrings from speckle patterns. In: Proc. Workshop on Information Optics 2008. JPCS, p. 139 (2008)
Fournel, T., Gillard, R., Becker, J.-M., Boutant, Y.: Morpho-cryptography: a new way for securing both information and storage media. In: Proc. SAR-SSI 2007, Annecy, June 12-15 (2007)
Goldreich, O.: Foundations of Cryptography II: Basic Applications. Cambridge University Press (2004)
Goldwasser, S., Micali, S.: Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information. In: Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, pp. 365–377. ACM, New York (1982)
Lancrenon, J.: Authentification d’Objets à Distance, Phd thesis, Université Joseph Fourier (June 2011)
Lancrenon, J., Gillard, R., Fournel, T.: Remote Object Authentication: Confidence Model, Cryptosystem, and Protocol. In: Dasarathy, B.V. (ed.) Data Mining, Intrusion Detection, Information Security and Assurance, and Data Network Security 2009. Proceedings of SPIE, vol. 7344, p. 20 (2009)
Lancrenon, J., Gillard, R., Fournel, T.: Remote Object Authentication Against Counterfeiting Using Elliptic Curves. To appear in the Proceedings of the SPIE Defense, Security, and Sensing 2011 Conference in Orlando, Fl., USA (2011)
Katz, J., Yung, M.: Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67–96 (2006)
Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure Against Chosen Ciphertext Attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM (1990)
Rackoff, C., Simon, D.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lancrenon, J., Gillard, R. (2012). Isolating Partial Information of Indistinguishable Encryptions. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2011. Lecture Notes in Computer Science, vol 7163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29804-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-29804-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29803-5
Online ISBN: 978-3-642-29804-2
eBook Packages: Computer ScienceComputer Science (R0)