Encryption security against key-dependent-message attacks: applications, realizations and separations

In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure even if the key of the system is used to encrypt its own individual bits. This notion (or slight extensions thereof) has foundat...

Full description

Bibliographic Details
Main Author: Hajiabadi, Mohammad
Other Authors: Kapron, Bruce M. (Bruce Michael)
Language:English
en
Published: 2016
Subjects:
Online Access:http://hdl.handle.net/1828/7454
id ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-7454
record_format oai_dc
spelling ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-74542016-08-23T16:59:14Z Encryption security against key-dependent-message attacks: applications, realizations and separations Hajiabadi, Mohammad Kapron, Bruce M. (Bruce Michael) Data encryption (Computer science) Public key cryptography In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure even if the key of the system is used to encrypt its own individual bits. This notion (or slight extensions thereof) has foundational applications, most notably in the context of fully-homomorphic encryption and amplification techniques for key dependent- message security. We explore the notion of circular security from three different perspectives, stemming from (1) assumptions sufficient to realize this notion, (2) minimal black-box assumptions on which this notion can be based and (c) applications of this notion when combined with other properties. Our main results are as follows: We give a construction of circular-secure public-key bit encryption based on any public-key encryption scheme that satisfies two special properties. We show that our constructed scheme besides circular security also offers two forms of key-leakage resilience. Our construction unifies two existing specific constructions of circular-secure schemes in the literature and also gives rise to the first construction based on homomorphic hash proof systems. We show that seed-circular-secure public-key bit-encryption schemes cannot be based on semantically-secure public-key encryption schemes in a fully-blackbox way. A scheme is seed-circular-secure if it allows for the bits of the seed (used to generate the public/secret keys) to be securely encrypted under the corresponding public key. We then extend this result to rule out a large and non-trivial class of constructions for circular security that we call key-isolating constructions. We give generic constructions of several fundamental cryptographic primitives based on a public-key bit-encryption scheme that combines circular security with a structural property called reproducibility. The main primitives that we build include families of trapdoor functions with strong security properties (i.e., one-wayness under correlated inputs), adaptive-chosen-ciphertext (CCA2) secure encryption schemes and deterministic encryption schemes. Graduate 0984 2016-08-17T20:02:36Z 2016-08-17T20:02:36Z 2016 2016-08-17 Thesis http://hdl.handle.net/1828/7454 English en Available to the World Wide Web
collection NDLTD
language English
en
sources NDLTD
topic Data encryption (Computer science)
Public key cryptography
spellingShingle Data encryption (Computer science)
Public key cryptography
Hajiabadi, Mohammad
Encryption security against key-dependent-message attacks: applications, realizations and separations
description In this thesis we study the notion of circular security for bit-encryption schemes. Informally speaking, a bit-encryption scheme is circular secure if it remains secure even if the key of the system is used to encrypt its own individual bits. This notion (or slight extensions thereof) has foundational applications, most notably in the context of fully-homomorphic encryption and amplification techniques for key dependent- message security. We explore the notion of circular security from three different perspectives, stemming from (1) assumptions sufficient to realize this notion, (2) minimal black-box assumptions on which this notion can be based and (c) applications of this notion when combined with other properties. Our main results are as follows: We give a construction of circular-secure public-key bit encryption based on any public-key encryption scheme that satisfies two special properties. We show that our constructed scheme besides circular security also offers two forms of key-leakage resilience. Our construction unifies two existing specific constructions of circular-secure schemes in the literature and also gives rise to the first construction based on homomorphic hash proof systems. We show that seed-circular-secure public-key bit-encryption schemes cannot be based on semantically-secure public-key encryption schemes in a fully-blackbox way. A scheme is seed-circular-secure if it allows for the bits of the seed (used to generate the public/secret keys) to be securely encrypted under the corresponding public key. We then extend this result to rule out a large and non-trivial class of constructions for circular security that we call key-isolating constructions. We give generic constructions of several fundamental cryptographic primitives based on a public-key bit-encryption scheme that combines circular security with a structural property called reproducibility. The main primitives that we build include families of trapdoor functions with strong security properties (i.e., one-wayness under correlated inputs), adaptive-chosen-ciphertext (CCA2) secure encryption schemes and deterministic encryption schemes. === Graduate === 0984
author2 Kapron, Bruce M. (Bruce Michael)
author_facet Kapron, Bruce M. (Bruce Michael)
Hajiabadi, Mohammad
author Hajiabadi, Mohammad
author_sort Hajiabadi, Mohammad
title Encryption security against key-dependent-message attacks: applications, realizations and separations
title_short Encryption security against key-dependent-message attacks: applications, realizations and separations
title_full Encryption security against key-dependent-message attacks: applications, realizations and separations
title_fullStr Encryption security against key-dependent-message attacks: applications, realizations and separations
title_full_unstemmed Encryption security against key-dependent-message attacks: applications, realizations and separations
title_sort encryption security against key-dependent-message attacks: applications, realizations and separations
publishDate 2016
url http://hdl.handle.net/1828/7454
work_keys_str_mv AT hajiabadimohammad encryptionsecurityagainstkeydependentmessageattacksapplicationsrealizationsandseparations
_version_ 1718380303028846592