Skip to main content

Isolating Partial Information of Indistinguishable Encryptions

  • Conference paper
Public Key Infrastructures, Services and Applications (EuroPKI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7163))

Included in the following conference series:

  • 568 Accesses

Abstract

In this paper we present a new notion of indistinguishability of encryptions that is proven equivalent to ind-cpa-security and separates the encryptions from whatever partial information about the plaintexts accompanies them. We then proceed to show its use in an authentication scheme setting.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Boldyreva, A., Micali, S.: Public-key Encryption in a Multi-user Setting: Security Proofs and Improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259–274. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–46. Springer, Heidelberg (1998)

    Google Scholar 

  3. Bringer, J., Chabanne, H., Izabachène, M., Pointcheval, D., Tang, Q., Zimmer, S.: An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96–106. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Bringer, J., Chabanne, H.: An Authentication Protocol with Encrypted Biometric Data. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 109–124. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science, pp. 41–50. IEEE, New York (1995)

    Google Scholar 

  6. Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-Key Encryption Schemes with Auxiliary Inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361–381. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Dodis, Y., Kalai, Y., Lovett, S.: On Cryptography with Auxiliary Input. In: STOC, pp. 621–630 (2009)

    Google Scholar 

  8. Fournel, T., Coltuc, D., Becker, J.-M., Boutant, Y.: Multiscale extraction of uncompressive bitstrings from speckle patterns. In: Proc. Workshop on Information Optics 2008. JPCS, p. 139 (2008)

    Google Scholar 

  9. Fournel, T., Gillard, R., Becker, J.-M., Boutant, Y.: Morpho-cryptography: a new way for securing both information and storage media. In: Proc. SAR-SSI 2007, Annecy, June 12-15 (2007)

    Google Scholar 

  10. Goldreich, O.: Foundations of Cryptography II: Basic Applications. Cambridge University Press (2004)

    Google Scholar 

  11. Goldwasser, S., Micali, S.: Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information. In: Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, pp. 365–377. ACM, New York (1982)

    Google Scholar 

  12. Lancrenon, J.: Authentification d’Objets à Distance, Phd thesis, Université Joseph Fourier (June 2011)

    Google Scholar 

  13. Lancrenon, J., Gillard, R., Fournel, T.: Remote Object Authentication: Confidence Model, Cryptosystem, and Protocol. In: Dasarathy, B.V. (ed.) Data Mining, Intrusion Detection, Information Security and Assurance, and Data Network Security 2009. Proceedings of SPIE, vol. 7344, p. 20 (2009)

    Google Scholar 

  14. Lancrenon, J., Gillard, R., Fournel, T.: Remote Object Authentication Against Counterfeiting Using Elliptic Curves. To appear in the Proceedings of the SPIE Defense, Security, and Sensing 2011 Conference in Orlando, Fl., USA (2011)

    Google Scholar 

  15. Katz, J., Yung, M.: Characterization of Security Notions for Probabilistic Private-Key Encryption. Journal of Cryptology 19(1), 67–96 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  16. Naor, M., Yung, M.: Public-key Cryptosystems Provably Secure Against Chosen Ciphertext Attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM (1990)

    Google Scholar 

  17. Rackoff, C., Simon, D.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lancrenon, J., Gillard, R. (2012). Isolating Partial Information of Indistinguishable Encryptions. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2011. Lecture Notes in Computer Science, vol 7163. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29804-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29804-2_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29803-5

  • Online ISBN: 978-3-642-29804-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics