Galindo D, Libert B, Fischlin M, Fuchsbauer G, Lehmann A, Manulis M, Schröder D (2010)
Publication Status: Published
Publication Type: Authored book, Volume of book series
Publication year: 2010
Series: Progress in Cryptology - AFRICACRYPT 2010
Pages Range: 333-350
Event location: Stellenbosch
ISBN: 9783642126772
DOI: 10.1007/978-3-642-12678-9_20
Public-key encryption schemes with non-interactive opening (PKENO) allow a receiver to non-interactively convince third parties that a ciphertext decrypts to a given plaintext or, alternatively, that such a ciphertext is invalid. Two practical generic constructions for PKENO have been proposed so far, starting from either identity-based encryption or public-key encryption with witness-recovering decryption (PKEWR). We show that the known transformation from PKEWR to PKENO fails to provide chosen-ciphertext security; only the transformation from identity-based encryption remains thus valid. Next, we prove that PKENO can alternatively be built out of robust non-interactive threshold public-key cryptosystems, a primitive that differs from identity-based encryption. Using the new transformation, we construct two efficient PKENO schemes: one based on the Decisional Diffie-Hellman assumption (in the Random-Oracle Model) and one based on the Decisional Linear assumption (in the standard model). Last but not least, we propose new applications of PKENO in protocol design. Motivated by these applications, we reconsider proof soundness for PKENO and put forward new definitions that are stronger than those considered so far. We give a taxonomy of all definitions and demonstrate them to be satisfiable. © 2010 Springer-Verlag.
APA:
Galindo, D., Libert, B., Fischlin, M., Fuchsbauer, G., Lehmann, A., Manulis, M., & Schröder, D. (2010). Public-key encryption with non-interactive opening: New constructions and stronger definitions.
MLA:
Galindo, David, et al. Public-key encryption with non-interactive opening: New constructions and stronger definitions. 2010.
BibTeX: Download