Back to Search Start Over

Circular Security Is Complete for KDM Security

Authors :
Takahiro Matsuda
Fuyuki Kitagawa
Source :
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367, ASIACRYPT (1)
Publication Year :
2020
Publisher :
Springer International Publishing, 2020.

Abstract

Circular security is the most elementary form of key-dependent message (KDM) security, which allows us to securely encrypt only a copy of secret key bits. In this work, we show that circular security is complete for KDM security in the sense that an encryption scheme satisfying this security notion can be transformed into one satisfying KDM security with respect to all functions computable by a-priori bounded-size circuits (bounded-KDM security). This result holds in the presence of any number of keys and in any of secret-key/public-key and CPA/CCA settings. Such a completeness result was previously shown by Applebaum (EUROCRYPT 2011) for KDM security with respect to projection functions (projection-KDM security) that allows us to securely encrypt both a copy and a negation of secret key bits. Besides amplifying the strength of KDM security, our transformation in fact can start from an encryption scheme satisfying circular security against CPA attacks and results in one satisfying bounded-KDM security against CCA attacks. This result improves the recent result by Kitagawa and Matsuda (TCC 2019) showing a CPA-to-CCA transformation for KDM secure public-key encryption schemes.

Details

ISBN :
978-3-030-64836-7
ISBNs :
9783030648367
Database :
OpenAIRE
Journal :
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367, ASIACRYPT (1)
Accession number :
edsair.doi...........b2bd9ab9a71c36772c5716b30619d378