z-logo
open-access-imgOpen Access
Publicly verifiable ciphertexts
Author(s) -
Juan González Nieto,
Mark Manulis,
Bertram Poettering,
Jothi Rangasamy,
Douglas Stebila
Publication year - 2013
Publication title -
journal of computer security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.201
H-Index - 56
eISSN - 1875-8924
pISSN - 0926-227X
DOI - 10.3233/jcs-130473
Subject(s) - ciphertext , verifiable secret sharing , computer science , encryption , plaintext , ciphertext indistinguishability , hybrid cryptosystem , public key cryptography , computer security , theoretical computer science , attribute based encryption , set (abstract data type) , programming language
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom