Publicly verifiable ciphertexts


Autoria(s): Gonzalez Nieto, Juan; Manulis, Mark; Poettering, Bertram; Rangasamy, Jothi; Stebila, Douglas
Data(s)

01/11/2013

Resumo

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/64863/

Publicador

IOS Press

Relação

http://eprints.qut.edu.au/64863/1/JCS473.pdf

DOI:10.3233/JCS-130473

Gonzalez Nieto, Juan, Manulis, Mark, Poettering, Bertram, Rangasamy, Jothi, & Stebila, Douglas (2013) Publicly verifiable ciphertexts. Journal of Computer Security, 21(5), pp. 749-778.

Direitos

Copyright 2013 IOS Press and the authors

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #080402 Data Encryption #ciphertext filtering #public key encryption #identity-based encryption #chosen ciphertext attacks
Tipo

Journal Article