Standard security does not imply security against selective-opening

Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

40 Citations (Scopus)

Abstract

We show that no commitment scheme that is hiding and binding according to the standard definition is semantically-secure under selective opening attack (SOA), resolving a long-standing and fundamental open question about the power of SOAs. We also obtain the first examples of IND-CPA encryption schemes that are not secure under SOA, both for sender corruptions where encryption coins are revealed and receiver corruptions where decryption keys are revealed. These results assume only the existence of collision-resistant hash functions.

Original languageEnglish
Title of host publicationAdvances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
EditorsDavid Pointcheval, Thomas Johansson
Place of PublicationCambridge UK
PublisherSpringer
Pages645-662
Number of pages18
Volume7237
ISBN (Print)9783642290107
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012 - Cambridge, United Kingdom
Duration: 15 Apr 201219 Apr 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7237 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012
CountryUnited Kingdom
CityCambridge
Period15/04/1219/04/12

Cite this

Bellare, M., Dowsley, R., Waters, B., & Yilek, S. (2012). Standard security does not imply security against selective-opening. In D. Pointcheval, & T. Johansson (Eds.), Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings (Vol. 7237, pp. 645-662). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7237 LNCS). Springer. https://doi.org/10.1007/978-3-642-29011-4_38