Title :
Bit Encryption Is Complete
Author :
Myers, Steven ; Shelat, Abhi
Author_Institution :
Sch. of Inf., Indiana Univ., Bloomington, IN, USA
Abstract :
Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, however, under a CCA2 attack. In fact, since the notion of CCA2 security was introduced by Rackoff and Simon [21], it has been an open question to determine whether single bit CCA2 secure encryption implies the existence of many-bit CCA2 security. We positively resolve this long-standing question and establish that bit encryption is complete for CPA, CCA1, and CCA2 notions. Our construction is black-box, and thus requires novel techniques to avoid known impossibility results concerning trapdoor predicates [10]. To the best of our knowledge, our work is also the first example of a non-shielding reduction (introduced in [9]) in the standard (i.e., not random-oracle) model.
Keywords :
public key cryptography; CCA1 attack; CCA2 secure encryption; CPA attack; bit encryption; many-bit CCA2 security; many-bit encryption scheme; secure bit encryption scheme; Computer science; Decoding; Informatics; Inspection; Public key; Public key cryptography; Security; Chosen-ciphertext secure public key encryption;
Conference_Titel :
Foundations of Computer Science, 2009. FOCS '09. 50th Annual IEEE Symposium on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-5116-6
DOI :
10.1109/FOCS.2009.65