Have a personal or library account? Click to login
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited Cover

Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited

Open Access
|Jun 2015

Abstract

Fehr et al. (2010) proposed the first sender-equivocable encryption scheme secure against chosen-ciphertext attacks (NCCCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attacks (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attacks of a new primitive, the “crossauthentication code”. However, the security of the cross-authentication code cannot be guaranteed when all the keys used in the code are exposed. Our key observation is that, in the NC-CCA security game, the randomness used in the generation of the challenge ciphertext is exposed to the adversary. Based on this observation, we provide a security analysis of Fehr et al.’s scheme, showing that its NC-CCA security proof is flawed. We also point out that the scheme of Fehr et al. encrypting a single-bit plaintext can be refined to achieve NC-CCA security, free of the cross-authentication code. Furthermore, we propose the notion of “strong cross-authentication code”, apply it to Fehr et al.’s scheme, and show that the new version of the latter achieves NC-CCA security for multi-bit plaintexts.

DOI: https://doi.org/10.1515/amcs-2015-0032 | Journal eISSN: 2083-8492 | Journal ISSN: 1641-876X
Language: English
Page range: 415 - 430
Submitted on: Jan 3, 2014
Published on: Jun 25, 2015
Published by: University of Zielona Góra
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2015 Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen, published by University of Zielona Góra
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.