Structure Preserving CCA Secure Encryption and Applications

Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we present the first CCA-secure public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular, it does not use hash-functions or interpret group elements as bit-strings. This makes our scheme a perfect building block for cryptographic protocols where parties for instance want to prove properties about ciphertexts to each other or to jointly compute ciphertexts. Our scheme is very efficient and is secure against adaptive chosen ciphertext attacks.

We also provide a few example protocols for which our scheme is useful. For instance, we present an efficient protocol for two parties, Alice and Bob, that allows them to jointly encrypt a given function of their respective secret inputs such that only Bob learns the resulting ciphertext, yet they are both ensured of the computation’s correctness. This protocol serves as a building block for our second contribution which is a set of protocols that implement the concept of so-called oblivious trusted third parties. This concept has been proposed before, but no concrete realization was known.
Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings
PublisherSpringer
Pages89-106
Number of pages18
ISBN (Electronic)978-3-642-25385-0
ISBN (Print)978-3-642-25384-3
DOIs
Publication statusPublished - 2011
Event17th Annual International Conference on Theory and Application of Cryptology and Information Security - Seoul, Korea, Democratic People's Republic of
Duration: 4 Dec 20118 Dec 2011

Conference

Conference17th Annual International Conference on Theory and Application of Cryptology and Information Security
Abbreviated titleAsiacrypt 2011
Country/TerritoryKorea, Democratic People's Republic of
CitySeoul
Period4/12/118/12/11

Fingerprint

Dive into the research topics of 'Structure Preserving CCA Secure Encryption and Applications'. Together they form a unique fingerprint.

Cite this