On definitions of selective opening security

49Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

Abstract

Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure? There are several ways to formalize this question, and the ensuing security notions are not known to be implied by standard notions of encryption security. In this work, we relate the two existing flavors of selective opening security. Our main result is that indistinguishability-based selective opening security and simulation-based selective opening security do not imply each other. We show our claims by counterexamples. Concretely, we construct two public-key encryption schemes. One scheme is secure under selective openings in a simulation-based sense, but not in an indistinguishability-based sense. The other scheme is secure in an indistinguishability-based sense, but not in a simulation-based sense. Our results settle an open question of Bellare et al. (Eurocrypt 2009). Also, taken together with known results about selective opening secure encryption, we get an almost complete picture how the two flavors of selective opening security relate to standard security notions. © 2012 International Association for Cryptologic Research.

References Powered by Scopus

Probabilistic encryption

2596Citations
N/AReaders
Get full text

Non-interactive and information-theoretic secure verifiable secret sharing

1642Citations
N/AReaders
Get full text

Universal one-way hash functions and their cryptographic applications

639Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Insight of the protection for data security under selective opening attacks

150Citations
N/AReaders
Get full text

Can a public blockchain keep a secret?

49Citations
N/AReaders
Get full text

Identity-based encryption secure against selective opening chosen-ciphertext attack

32Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Böhl, F., Hofheinz, D., & Kraschewski, D. (2012). On definitions of selective opening security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7293 LNCS, pp. 522–539). https://doi.org/10.1007/978-3-642-30057-8_31

Readers over time

‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘23‘240481216

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 28

74%

Professor / Associate Prof. 4

11%

Researcher 4

11%

Lecturer / Post doc 2

5%

Readers' Discipline

Tooltip

Computer Science 32

84%

Physics and Astronomy 2

5%

Engineering 2

5%

Mathematics 2

5%

Save time finding and organizing research with Mendeley

Sign up for free
0