Show simple item record

Bounded CCA2-Secure Non-Malleable Encryption

dc.date.accessioned2006-12-14T14:51:47Z
dc.date.accessioned2018-11-24T10:25:14Z
dc.date.available2006-12-14T14:51:47Z
dc.date.available2018-11-24T10:25:14Z
dc.date.issued2006-12-14
dc.identifier.urihttp://hdl.handle.net/1721.1/34968
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/34968
dc.description.abstractUnder an adaptive chosen ciphertext attack (CCA2), the security of an encryption scheme must hold against adversaries that have access to a decryption oracle. We consider a weakening of CCA2 security, wherein security need only hold against adversaries making an a-priori bounded number of queries to the decryption oracle. Concerning this notion, which we call bounded-CCA2 security, we show the following two results. (1) Bounded-CCA2 secure non-malleable encryption schemes exist if and only if semantically-secure (IND-CPA-secure) encryption schemes exist.(As far as we know, bounded-CCA2 non-malleability is the strongest notion of security known to be satisfiable assuming only the existence of semantically-secure encryption schemes.) (2) In contrast to CCA2 security, bounded-CCA2 security alone does not imply non-malleability. In particular, if there exists an encryption scheme that is bounded-CCA2 secure, then there exists another encryption scheme which remains bounded-CCA2 secure, but is malleable under a simple chosen-plaintext attack.
dc.format.extent17 p.
dc.format.extent1222225 bytes
dc.format.extent239045 bytes
dc.language.isoen_US
dc.subjectPublic-key Encryption
dc.subjectNon-Malleability
dc.subjectChosen Ciphertext Security
dc.titleBounded CCA2-Secure Non-Malleable Encryption


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2006-081.pdf239.0Kbapplication/pdfView/Open
MIT-CSAIL-TR-2006-081.ps1.222Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record