Reproducible circularly-secure bit encryption: Applications and realizations

Mohammad Hajiabadi, Bruce M. Kapron

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations

    Abstract

    We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property (Bellare et al. PKC 2003). At the heart of our constructions is a novel technique which gives a way of de-randomizing reproducible public-key bitencryption schemes and also a way of reducing one-wayness conditions of a constructed trapdoor-function family (TDF) to circular security of the base scheme. The main primitives that we build from our encryption primitive include k-wise one-way TDFs (Rosen and Segev TCC 2009), CCA2- secure encryption and deterministic encryption. Our results demonstrate a new set of applications of circularly-secure encryption beyond fullyhomomorphic encryption and symbolic soundness. Finally, we show the plausibility of our assumptions by showing that the DDH-based circularlysecure scheme of Boneh et al. (Crypto 2008) and the subgroup indistinguishability based scheme of Brakerski and Goldwasser (Crypto 2010) are both reproducible.

    Original languageEnglish (US)
    Title of host publicationAdvances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings
    EditorsMatthew Robshaw, Rosario Gennaro
    PublisherSpringer Verlag
    Pages224-243
    Number of pages20
    ISBN (Print)9783662479889
    DOIs
    StatePublished - 2015
    Event35th Annual Cryptology Conference, CRYPTO 2015 - Santa Barbara, United States
    Duration: Aug 16 2015Aug 20 2015

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume9215
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference35th Annual Cryptology Conference, CRYPTO 2015
    CountryUnited States
    CitySanta Barbara
    Period8/16/158/20/15

    All Science Journal Classification (ASJC) codes

    • Theoretical Computer Science
    • Computer Science(all)

    Fingerprint Dive into the research topics of 'Reproducible circularly-secure bit encryption: Applications and realizations'. Together they form a unique fingerprint.

    Cite this