Separations in Circular Security for Arbitrary Length Key Cycles.

Lecture Notes in Computer Science(2015)

引用 37|浏览84
暂无评分
摘要
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ciphertexts Enc(pk(1), sk(2)), Enc(pk(2), sk(3)), ... , Enc(pk(n), sk(1)) should be indistinguishable from encryptions of zero. In this work we prove the following results for n-circular security, based upon recent candidate constructions of indistinguishability obfuscation [18,16] and one way functions: For any n there exists an encryption scheme that is IND-CPA secure but not n-circular secure. There exists a bit encryption scheme that is IND-CPA secure, but not 1-circular secure. If there exists an encryption system where an attacker can distinguish a key encryption cycle from an encryption of zeroes, then in a transformed cryptosystem there exists an attacker which recovers secret keys from the encryption cycles. The last result is generic and applies to any such cryptosystem.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要