2008
DOI: 10.1007/978-3-540-89255-7_31
|View full text |Cite
|
Sign up to set email alerts
|

OAEP Is Secure under Key-Dependent Messages

Abstract: Abstract. Key-dependent message security, short KDM security, was introduced by Black, Rogaway and Shrimpton to address the case where key cycles occur among encryptions, e.g., a key is encrypted with itself. We extend this definition to include the cases of adaptive corruptions and arbitrary active attacks, called adKDM security incorporating several novel design choices and substantially differing from prior definitions for public-key security. We also show that the OAEP encryption scheme (using a partial-do… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
37
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(39 citation statements)
references
References 36 publications
2
37
0
Order By: Relevance
“…We note that the definition of security by Backes et al [BDU08] is somewhat stronger in that it allows the adversary to obtain some secret keys. To benefit from this in practice, the users need to carefully keep track of which keys were compromised, and which keys are related to each other via key-wrap.…”
Section: Kdm-cpamentioning
confidence: 98%
See 1 more Smart Citation
“…We note that the definition of security by Backes et al [BDU08] is somewhat stronger in that it allows the adversary to obtain some secret keys. To benefit from this in practice, the users need to carefully keep track of which keys were compromised, and which keys are related to each other via key-wrap.…”
Section: Kdm-cpamentioning
confidence: 98%
“…Backes, Pfitzmann and Scedrov [BPS07] and Backes, Dürmuth and Unruh [BDU08] considered KDM-CCA2 security of symmetric and asymmetric encryption schemes, respectively. They in fact define a notion of security stronger than we consider in our paper, by allowing the adversary to obtain some of the secret keys.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers then asked for what classes of message-deriving functions one could achieve KDM security in the standard model, providing results for both symmetric and asymmetric encryption under different assumptions [19,36,4,21,23,20,7,25,17,3,38]. On the more practical side, Backes, Dürmuth and Unruh [5] show that RSA-OAEP [13,28] is KDM-secure in the RO model. Backes, Pfitzmann and Scedrov [6] treat active attacks and provide and relate a number of different notions of security.…”
Section: Impossibility Resultsmentioning
confidence: 99%
“…Over the last few years we have seen a large number of sophisticated schemes to address the (challenging) problem of encryption of key-dependent data (e.g., [22,28,5,4,32,33,21,7,59,3,30,31,13,46,55]). The most touted application is secure outsourced storage, where Alice's decryption key, or some function thereof, is in a file she is encrypting and uploading to the cloud.…”
Section: Introductionmentioning
confidence: 99%