Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
スポンサーリンク
概要
- 論文の詳細を見る
Let a sender Alice computes a ciphertext C of a message M by using a receiver Bob’s public key pk B . Damgård, Hofheinz, Kiltz, and Thorbek (CT-RSA2008) has proposed the notion public key encryption with non-interactive opening (PKENO), where Bob can make an non-interactive proof π that proves the decryption result of C under sk B is M, without revealing sk B itself. When Bob would like to prove the correctness of (C, M) (e.g., the information M sent to Bob is not the expected one), PKENO turns out to be an effective cryptographic primitive. A PKENO scheme for the KEM/DEM framework has also been proposed by Galindo (CT-RSA2009). Bob can make a non-interactive proof π that proves the decapsulation result of C under sk B is K without revealing sk B itself, where K is an encapsulation key of the DEM part. That is, no verifier can verify π without knowing K. This setting is acceptable if K is an ephemeral value. However, PKENO is not applicable if an encryption key is shared among certain users beforehand, and is used for a relatively long period before re-running the key agreement protocol, such as symmetric cryptosystems. In this paper, we define the notion secret key encryption with non-interactive opening (SKENO), and give a generic construction of SKENO from verifiable random function (VRF) and the Berbain-Gilbert IV-dependent stream cipher construction (FSE2007). Bob can make a non-interactive proof π that proves the decryption result of C under K is M, without revealing K itself.
- 2011-11-01
論文 | ランダム
- 「自然の保護と利用に関する世論調査」の結果
- ガラパゴス国立公園における油流出事故
- 新しい全国総合開発計画「21世紀の国土のグランドデザイン--地域の自立の促進と美しい国土の創造」
- 匿名性定量化手法LooMを用いた防犯支援のための情報共有サービス(ユビキタスサービス管理,ユビキタスネットワーク,モバイルネットワーク及び一般)
- プライバシー保護実現に向けた秘匿性定量化手法: LooM(「ネットワークデータマイニング」「センサデータマイニング」)