Lossy Encryption:Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
Brett Hemenway, Benoit Libert, Rafail Ostrovsky, Damien Vergnaud,
Lossy encryption was originally studied as a means of achieving efficient and composable oblivious transfer. Bellare, Hofheinz and Yilek showed that lossy encryption is also selective opening Secure. We present new and general constructions of lossy encryption schemes and of cryptosystems secure against selective opening adversaries.
We show that every re-randomizable encryption scheme gives rise to efficient encryptions secure against a selective opening adversary. We show that statistically -hiding 2-round oblivious Transfer implies Lossy Encryption and so do smooth hash proof systems. This shows that private information retrieval and homomorphic encryption both imply Lossy encryption, and thus Selective Opening Secure Public Key Encryption. Applying our constructions to well-Known cryptosystems, we obtain selective opening secure commitments and encryptosystems, we obtain selective opening secure commitments and encryptions from the "Decisional Diffie-Hellman, Decisional Composite Residuosity and Quadratic Residuosity " assumptions.
In an indistinguishability-based model of chosen-ciphertext selective opening security, we obtain secure schemes featuring short ciphertexts under standard number theoretic assumptions. In a simulation-based definition of chosen-ciphertext selective opening security,
comment: ASIACRYPT 2011: 70-88
Fetch PDF file of the paper
|Back to Publications List|