2012
DOI: 10.1007/978-3-642-30057-8_31
|View full text |Cite
|
Sign up to set email alerts
|

On Definitions of Selective Opening Security

Abstract: Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure? There are several ways to formalize this question, and the ensuing security notions are not known to be implied by standard notions of encryption security. In this work, we relate the two existing flavors of selective opening security. Our main result is that indistinguishability-based selective opening security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
26
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 19 publications
0
26
0
Order By: Relevance
“…As with commitment, our results imply that IND-SOA-CRS security is strictly weaker than SS-SOA-CRS security, answering an open question from [2,7]. Subsequent to our work, the relations between different notions of SOA-security under sender corruptions were further clarified in [9] but whether there exist schemes that are IND-CPA but not IND-SOA-CRS secure remains open.…”
mentioning
confidence: 51%
“…As with commitment, our results imply that IND-SOA-CRS security is strictly weaker than SS-SOA-CRS security, answering an open question from [2,7]. Subsequent to our work, the relations between different notions of SOA-security under sender corruptions were further clarified in [9] but whether there exist schemes that are IND-CPA but not IND-SOA-CRS secure remains open.…”
mentioning
confidence: 51%
“…[17]) do not seem to match this protocol. Possibly extensions of these notions might cover this case, but it is not clear what these extensions should look like (in particular if we extend the protocol such that some of the e i,j may depend on other e i,j , e.g., by including the latter in some of the plaintexts of the former).…”
mentioning
confidence: 82%
“…Since the set I is the same in both executions, it must be that (π 0 , pk 0 ) = (π 1 , pk 1 ). So Indeed, for R-PKE, SOA-security definitions in both styles have been made and investigated, and the indistinguishability style is easier to achieve [11,16,17,30]. The difficulty is that for D-PKE it is not clear how to give a meaningful indistinguishability style definition of SOA-security.…”
Section: Is Soa Security Achievable?mentioning
confidence: 99%
“…The problem of SOA-security has been the subject of many works [3,21,20,2,23,33,25,22,36,11,16,26,15,29,17,30]. These have looked at R-PKE, commitment and IBE.…”
Section: Introductionmentioning
confidence: 99%