More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure

Detectable Chosen Ciphertext Security DCCA security is a weaker notion than CCA security. An 'inner-outer' structure is shown to build a CCA-secure PKE from a DCCA-secure PKE, a 1-bounded CCA-secure PKE, and a CPA-secure PKE. In this paper, we first show passive security for DEMs is sufficient for achieving DCCA-secure hybrid PKEs both for KEM+DEM and Tag-KEM/DEM paradigms. Then two DCCA-secure PKEs constructed from CCA secure KEMs are presented. In addition, a counter example to show that the 1-bounded CCA secure component in the 'inner-outer' structure cannot be weakened to CPA one is given, and some possible methods for constructing CCA-secure PKEs from DCCA-secure KEMs are discussed.

[1]  Yue Wang,et al.  A new proxy blind signature scheme , 2012, Int. J. Grid Util. Comput..

[2]  Adam O'Neill,et al.  Adaptive Trapdoor Functions and Chosen-Ciphertext Security , 2010, EUROCRYPT.

[3]  Kaoru Kurosawa,et al.  Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.

[4]  Haibo Tian A new strong multiple designated verifiers signature , 2012, Int. J. Grid Util. Comput..

[5]  Allison Bishop,et al.  Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security , 2012, EUROCRYPT.

[6]  Yvo Desmedt,et al.  A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.

[7]  Eike Kiltz,et al.  Chosen-Ciphertext Security from Tag-Based Encryption , 2006, TCC.

[8]  Eike Kiltz,et al.  Secure Hybrid Encryption from Weakened Key Encapsulation , 2007, CRYPTO.

[9]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[10]  Javier Herranz,et al.  Some (in)sufficient conditions for secure hybrid encryption , 2010, Inf. Comput..

[11]  Michael K. Reiter,et al.  Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract) , 2004, TCC.

[12]  Steven Myers,et al.  Bit Encryption Is Complete , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[13]  Bao Li,et al.  Universally composable zero-knowledge sets , 2012, Int. J. Grid Util. Comput..

[14]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[15]  Hugo Krawczyk,et al.  Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.

[16]  Georg Fuchsbauer,et al.  Enhanced Chosen-Ciphertext Security and Applications , 2014, Public Key Cryptography.

[17]  Moni Naor,et al.  Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.

[18]  Tal Malkin,et al.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2008, TCC.

[19]  Alexander W. Dent,et al.  A Designer's Guide to KEMs , 2003, IMACC.

[20]  Tal Rabin,et al.  On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.

[21]  Abhi Shelat,et al.  Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2006, CRYPTO.

[22]  Abhi Shelat,et al.  Bounded CCA2-Secure Encryption , 2007, ASIACRYPT.