Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model
  syRljlCB1Ygs 2023年11月02日 23 0

Abstract. In this paper, we consider tight multi-user security under

adaptive corruptions, where the adversary can adaptively corrupt some

users and obtain their secret keys. We propose generic constructions for

a bunch of primitives, and the instantiations from the matrix decisional

Diffie-Hellman (MDDH) assumptions yield the following schemes:

(1) the first digital signature (SIG) scheme achieving almost tight strong

EUF-CMA security in the multi-user setting with adaptive corruptions in the standard model;

(2) the first public-key encryption (PKE) scheme achieving almost tight

IND-CCA security in the multi-user multi-challenge setting with

adaptive corruptions in the standard model;

(3) the first signcryption (SC) scheme achieving almost tight privacy and

authenticity under CCA attacks in the multi-user multi-challenge

setting with adaptive corruptions in the standard model.

As byproducts, our SIG and SC naturally derive the first strongly secure

message authentication code (MAC) and the first authenticated encryption (AE) schemes achieving almost tight multi-user security under adaptive corruptions in the standard model. We further optimize constructions of SC, MAC and AE to admit better efficiency.

Furthermore, we consider key leakages besides corruptions, as a natural strengthening of tight multi-user security under adaptive corruptions.

This security considers a more natural and more complete “all-or-partor-nothing” setting, where secret keys of users are either fully exposed

to adversary (“all”), or completely hidden to adversary (“nothing”), or

partially leaked to adversary (“part”), and it protects the uncorrupted

users even with bounded key leakages. All our schemes additionally support bounded key leakages and enjoy full compactness. This yields the

first SIG, PKE, SC, MAC, AE schemes achieving almost tight multi-user

security under both adaptive corruptions and leakages

【版权声明】本文内容来自摩杜云社区用户原创、第三方投稿、转载,内容版权归原作者所有。本网站的目的在于传递更多信息,不拥有版权,亦不承担相应法律责任。如果您发现本社区中有涉嫌抄袭的内容,欢迎发送邮件进行举报,并提供相关证据,一经查实,本社区将立刻删除涉嫌侵权内容,举报邮箱: cloudbbs@moduyun.com

  1. 分享:
最后一次编辑于 2023年11月08日 0

暂无评论

推荐阅读
  4i8hCvzXKbg6   2023年11月30日   34   0   0 StandardciTime
  4i8hCvzXKbg6   2023年11月24日   43   0   0 IPideTCP
  syRljlCB1Ygs   2023年11月26日   38   0   0 sedciide
  4i8hCvzXKbg6   2023年12月10日   24   0   0 StandardciTime
  PUL2Nb3n9wqa   2023年11月22日   28   0   0 自定义cibundle
  4i8hCvzXKbg6   2023年12月02日   27   0   0 StandardciTime
syRljlCB1Ygs