Presentation | 2007-09-07 An Approach to Duality in Public Key Cryptosystems Kazuo OHTA, Yuichi KOMANO, Yutaka KAWAI, Shinichi KAWAMURA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The security of cryptosystems is formalized by the combination of adversarial goal GOAL and attack model ATK. Paillier and Villar proved the impossible results that single key factoring-based encryption schemes are not proven to be IND-CCA secure, by using the meta reduction technique under the assumption of the KPBB reduction. In this report, we first point out that the meta reduction constructed by Paillier and Villar is not strict enough; namely, their discussion on the impossible results is not tight. We then propose the canonical meta reductions which are effective for the tight proof of the impossible results, and formulate the canonical relations (the duality) between GOAL and ATK of well known attacks and goals, naturally derived from the canonical reductions. Finally, we give the proof of the impossibility results of each GOAL-ATK which satisfy the duality. These impossible results for single key factoring based encryption schemes are tighter than the results by Paillier and Villar. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | adversarial goal / attack model / meta reduction technique / duality / incompatibility / impossibility |
Paper # | ISEC2007-87 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2007/8/31(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Approach to Duality in Public Key Cryptosystems |
Sub Title (in English) | |
Keyword(1) | adversarial goal |
Keyword(2) | attack model |
Keyword(3) | meta reduction technique |
Keyword(4) | duality |
Keyword(5) | incompatibility |
Keyword(6) | impossibility |
1st Author's Name | Kazuo OHTA |
1st Author's Affiliation | The University of Electro-Communications() |
2nd Author's Name | Yuichi KOMANO |
2nd Author's Affiliation | Computer & Network Systems Laboratory, Corporate Research & Development Center, Toshiba Corporation |
3rd Author's Name | Yutaka KAWAI |
3rd Author's Affiliation | The University of Electro-Communications |
4th Author's Name | Shinichi KAWAMURA |
4th Author's Affiliation | Computer & Network Systems Laboratory, Corporate Research & Development Center, Toshiba Corporation |
Date | 2007-09-07 |
Paper # | ISEC2007-87 |
Volume (vol) | vol.107 |
Number (no) | 209 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |