On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems

نویسندگان

  • Yutaka Kawai
  • Yusuke Sakai
  • Noboru Kunihiro
چکیده

In this paper, we discuss the strong attack model security for public key encryption scheme and digital signature scheme. Recently, Barbosa and Farshim introduced strong chosen ciphertext attack (SCCA) which is stronger than chosen ciphertext attack. The main motivation of this paper is to find an essential mechanism of secure schemes under strong attack model. So, we prove several impossibility results under SCCA model. For the purpose, we classify two types of public key encryption schemes: First model is Π = (Gen,Enc,Dec) which we call the setup-free model, second model is Π = (Setup,Gen,Enc,Dec) which we call the setup model. We prove that it is impossible to reduce indistinguishability under strong chosen ciphertext attack (IND-SCCA) security to any other weaker security notion under black-box analysis in the standard model. Second, when a public key encryption scheme is modeled as Π = (Setup,Gen,Enc,Dec), we show that it is impossible that the security of SCCA is proven if the reduction is setup-preserving black-box reductions which we define in this paper. From the similar discussion, we prove impossibilities for digital signature schemes. Finally, we discuss the essential mechanism to construct IND-SCCA secure public key encryption scheme in the standard model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

A review on West African Ebola epidemic dynamics models

Background and aims: The world is threatened by disease outbreak that reaches a public health emergency of international concern, studies to inform public and agencies for effective containment strategy are necessary. Several studies provided vital information of the dynamics and control of Ebola epidemic outbreak in West Africa. Methodologies and techniques in those researches...

متن کامل

بررسی معیارهای مهم در جلب مشارکت بخش خصوصی در احداث، تجهیز و بهره برداری بیمارستان ها با استفاده از مدل مشارکت بخش دولتی و خصوصی

Background: Partnership between public and private section is the cooperation between institutions in these sectors which perform to attain common goals and eliminate the limitations. This study aimed at investigating the important criteria for attraction of private section in health sector. Material and Methods: Based on studies and sample surveys, governments have essential role for codifi...

متن کامل

Providing a model for the possibility of establishing a standard 34,000 human resource management system in Ansar Bank

The present study seeks to provide a model for the possibility of establishing a standard system of 34,000 human resource management and provide a favorable model in Ansar Bank. Managers and experts of Ansar Bank are considered as a statistical population of a small section, which was about 1500 people, is a cluster sampling method. In this study, to estimate the sample size according to the nu...

متن کامل

A collusion attack on the fuzzy vault scheme

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Internet Serv. Inf. Secur.

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2011