Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Security and Communi...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Security and Communication Networks
Article . 2013 . Peer-reviewed
License: Wiley Online Library User Agreement
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
DBLP
Article . 2020
Data sources: DBLP
versions View all 2 versions
addClaim

RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA‐secure KEMs to CCA‐secure encryptions

Authors: Yuan Chen 0008; Qingkuan Dong;

RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA‐secure KEMs to CCA‐secure encryptions

Abstract

ABSTRACTReplayable chosen‐ciphertext attack (RCCA) security is a weaker notion than chosen‐ciphertext attack (CCA) security and has been proven to be sufficient for several cryptographic tasks. However, it is open to construct RCCA‐secure schemes more efficient than CCA‐secure ones. This paper adapts RCCA security to the most popular hybrid paradigms, KEM+DEM and Tag‐KEM/DEM. For KEM+DEM paradigm, we show RCCA security is consistent with the CCA case, just as desired. But for Tag‐KEM/DEM paradigm, we find some different status. Natural RCCA‐secure Tag‐KEM schemes can be easily constructed, which are more efficient than all existing CCA‐secure ones. But unfortunately, passive security of DEM is not sufficient to obtain RCCA hybrid encryptions. In spite of this and for completeness, we show RCCA‐secure DEMs are still sufficient. On the other hand, for passive secure DEMs, we prove that a stronger notion of RCCA security for Tag‐KEM, named as tRCCA security, suffices for RCCA‐secure hybrid encryptions. This somewhat suggests that a benign RCCA security for tag‐based schemes should be tRCCA security. Finally, to show RCCA‐secure KEM is sufficient for achieving CCA‐secure hybrid encryptions, we introduce a new hybrid paradigm, named as KEM/Tag‐DEM, where the ciphertext of KEM is used as a tag for Tag‐DEM scheme rather than reversely in Tag‐KEM/DEM, so that the security of KEM can be weakened to RCCA one. KEM/Tag‐DEM shows the diversity of hybrid encryptions and has additional practical values. We also show Tag‐DEMs can be constructed as efficiently as DEMs. Copyright © 2013 John Wiley & Sons, Ltd.

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    7
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
7
Average
Average
Top 10%
gold