Presentation 2007-09-07
An Approach to Duality in Public Key Cryptosystems
Kazuo OHTA, Yuichi KOMANO, Yutaka KAWAI, Shinichi KAWAMURA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier and Villar proved the impossible results that single key factoring-based encryption schemes are not proven to be IND-CCA secure, by using the meta reduction technique under the assumption of the KPBB reduction. In this report, we first point out that the meta reduction constructed by Paillier and Villar is not strict enough; namely, their discussion on the impossible results is not tight. We then propose the canonical meta reductions which are effective for the tight proof of the impossible results, and formulate the canonical relations (the duality) between GOAL and ATK of well known attacks and goals, naturally derived from the canonical reductions. Finally, we give the proof of the impossibility results of each GOAL-ATK which satisfy the duality. These impossible results for single key factoring based encryption schemes are tighter than the results by Paillier and Villar.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) adversarial goal / attack model / meta reduction technique / duality / incompatibility / impossibility
Paper # ISEC2007-87
Date of Issue

Conference Information
Committee ISEC
Conference Date 2007/8/31(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) An Approach to Duality in Public Key Cryptosystems
Sub Title (in English)
Keyword(1) adversarial goal
Keyword(2) attack model
Keyword(3) meta reduction technique
Keyword(4) duality
Keyword(5) incompatibility
Keyword(6) impossibility
1st Author's Name Kazuo OHTA
1st Author's Affiliation The University of Electro-Communications()
2nd Author's Name Yuichi KOMANO
2nd Author's Affiliation Computer & Network Systems Laboratory, Corporate Research & Development Center, Toshiba Corporation
3rd Author's Name Yutaka KAWAI
3rd Author's Affiliation The University of Electro-Communications
4th Author's Name Shinichi KAWAMURA
4th Author's Affiliation Computer & Network Systems Laboratory, Corporate Research & Development Center, Toshiba Corporation
Date 2007-09-07
Paper # ISEC2007-87
Volume (vol) vol.107
Number (no) 209
Page pp.pp.-
#Pages 8
Date of Issue