Passer à la navigation principale Passer à la recherche Passer au contenu principal

Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

The notion of (Receiver-) Anamorphic Encryption was put forth recently to show that a dictator (i.e., an overreaching government), which demands to get the receiver’s private key and even dictates messages to the sender, cannot prevent the receiver from getting an additional covert anamorphic message from a sender. The model required an initial private collaboration to share some secret. There may be settings though where an initial collaboration may be impossible or performance-wise prohibitive, or cases when we need an immediate message to be sent without private key generation (e.g., by any casual sender in need). This situation, to date, somewhat limits the applicability of anamorphic encryption. To overcome this, in this work, we put forth the new notion of “public-key anamorphic encryption,” where, without any initialization, any sender that has not coordinated in any shape or form with the receiver, can nevertheless, under the dictator control of the receiver’s private key, send the receiver an additional anamorphic secret message hidden from the dictator. We define the new notion with its unique new properties, and then prove that, quite interestingly, the known CCA-secure Koppula-Waters (KW) system is, in fact, public-key anamorphic. We then describe how a public-key anamorphic scheme can support a new hybrid anamorphic encapsulation mode (KDEM) where the public-key anamorphic part serves a bootstrapping mechanism to activate regular anamorphic messages in the same ciphertext, thus together increasing the anamorphic channel capacity. Looking at the state of research thus far, we observe that the initial system (Eurocrypt’22) that was shown to have regular anamorphic properties is the CCA-secure Naor-Yung (and other related schemes). Here we identify that the KW CCA-secure scheme also provides a new type of anamorphism. Thus, this situation is hinting that there may be a connection between some types of CCA-secure schemes and some type of anamorphic schemes (in spite of the fact that the goals of the two primitives are fundamentally different); this question is foundational in nature. Given this, we identify a sufficient condition for a “CCA-secure scheme which is black-box reduced from a CPA secure scheme” to directly give rise to an “anamorphic encryption scheme!” Furthermore, we identify one extra property of the reduction, that yields a public-key anamorphic scheme as defined here.

langue originaleAnglais
titreAdvances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
rédacteurs en chefLeonid Reyzin, Douglas Stebila
EditeurSpringer Science and Business Media Deutschland GmbH
Pages422-455
Nombre de pages34
ISBN (imprimé)9783031683787
Les DOIs
étatPublié - 1 janv. 2024
Evénement44th Annual International Cryptology Conference, CRYPTO 2024 - Santa Barbara, États-Unis
Durée: 18 août 202422 août 2024

Série de publications

NomLecture Notes in Computer Science
Volume14921 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférence44th Annual International Cryptology Conference, CRYPTO 2024
Pays/TerritoireÉtats-Unis
La villeSanta Barbara
période18/08/2422/08/24

Empreinte digitale

Examiner les sujets de recherche de « Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation