2009
DOI: 10.1007/978-3-642-10366-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Hedged Public-Key Encryption: How to Protect against Bad Randomness

Abstract: Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, leading to failure of the schemes. Expecting the systems to improve is unrealistic. What we show in this paper is that we can, instead, improve the cryptography to offset the lack of possible randomness. We provide public-key encryption schemes that achieve IND-CPA security when the randomness they use is of high quality, but, when the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
122
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 107 publications
(122 citation statements)
references
References 29 publications
0
122
0
Order By: Relevance
“…Moreover, for public-key encryption (as cryptosystem C) and Chosen Distribution Attack [1,2] (as game S) we will prove that C(WRO) is S-secure, which implies the appropriateness of the new concept of the WRO model.…”
Section: Our Contributions -A New Proposal Of Wro Methodology -mentioning
confidence: 86%
See 4 more Smart Citations
“…Moreover, for public-key encryption (as cryptosystem C) and Chosen Distribution Attack [1,2] (as game S) we will prove that C(WRO) is S-secure, which implies the appropriateness of the new concept of the WRO model.…”
Section: Our Contributions -A New Proposal Of Wro Methodology -mentioning
confidence: 86%
“…The IND-SIM security is a very weak property that an adversary cannot distinguish between encryptions of chosen messages under chosen randomness and the output of a simulator. 2 We show that any IND-SIM secure [21] 2 This definition is meaningless in the standard model because the encryption algorithm uses no further randomness beyond that input. 3 From Theorem 2 and 3, the CDA security in the WRO model is preserved if WRO is replaced with the ChopMD construction and the FOLSponge construction.…”
Section: Appropriateness Of Wromentioning
confidence: 99%
See 3 more Smart Citations