Is it possible to build a CPA-secure encryption scheme which remains secure even when the encryption of secret key is given?What is the “Random Oracle Model” and why is it controversial?Is the software that uses PGP broken, or is it PGP itself?Why is an Encrypt-and-MAC scheme with deterministic MAC not IND-CPA secure?Is the AES encryption scheme CPA secure?Building a combined encryption scheme from two encryption schemes that's secure if at least on of them is secureCiphertext size of any CPA-secure public-key encryption schemeProve that the given scheme is CPA secure or notAre there deterministic private-key encryption schemes that are CPA-secure?Proving that there is no scheme which would be perfectly CPA-secureUnforgeable CPA-secure private-key encryption scheme that is not CCA-secureIs the scheme $(r, Mac_k(r) oplus m)$ CPA-secure?Proof that secret sharing based scheme is CPA secure as long as one of the scheme is CPA secure

Using “sparkling” as a diminutive of “spark” in a poem

Cascading Repair Costs following Blown Head Gasket on a 2004 Subaru Outback

Does squid ink pasta bleed?

Going to get married soon, should I do it on Dec 31 or Jan 1?

Intuitively, why does putting capacitors in series decrease the equivalent capacitance?

Layout of complex table

Is this one of the engines from the 9/11 aircraft?

Architecture of networked game engine

How can Charles Proxy change settings without admin rights after first time?

Can a US president have someone sent to prison?

Was touching your nose a greeting in second millenium Mesopotamia?

Does ultrasonic bath cleaning damage laboratory volumetric glassware calibration?

Transition from ascending to descending a rope

What happens when your group is victim of a surprise attack but you can't be surprised?

In the Marvel universe, can a human have a baby with any non-human?

Is there any set of 2-6 notes that doesn't have a chord name?

Why is Madam Hooch not a professor?

Is it possible to buy a train ticket CDG airport to Paris truly online?

The use of "I" and "we" used in the same sentence and other questions

How many satellites can stay in a Lagrange point?

What is this particular type of chord progression, common in classical music, called?

Pull-up sequence accumulator counter

Analog is Obtuse!

Every infinite linearly ordered set has two disjoint infinite subsets



Is it possible to build a CPA-secure encryption scheme which remains secure even when the encryption of secret key is given?


What is the “Random Oracle Model” and why is it controversial?Is the software that uses PGP broken, or is it PGP itself?Why is an Encrypt-and-MAC scheme with deterministic MAC not IND-CPA secure?Is the AES encryption scheme CPA secure?Building a combined encryption scheme from two encryption schemes that's secure if at least on of them is secureCiphertext size of any CPA-secure public-key encryption schemeProve that the given scheme is CPA secure or notAre there deterministic private-key encryption schemes that are CPA-secure?Proving that there is no scheme which would be perfectly CPA-secureUnforgeable CPA-secure private-key encryption scheme that is not CCA-secureIs the scheme $(r, Mac_k(r) oplus m)$ CPA-secure?Proof that secret sharing based scheme is CPA secure as long as one of the scheme is CPA secure






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;








7












$begingroup$


How can I design a CPA-secure encryption scheme which is secure even after the encryption of secret key is given in the training phase? I.e., in the training phase, $mathitEnc_mathitpk(mathitsk)$ is given to the attacker, where $(mathitsk,mathitpk)$ is the key pair.










share|improve this question











$endgroup$











  • $begingroup$
    We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
    $endgroup$
    – kiran
    Mar 25 at 15:04

















7












$begingroup$


How can I design a CPA-secure encryption scheme which is secure even after the encryption of secret key is given in the training phase? I.e., in the training phase, $mathitEnc_mathitpk(mathitsk)$ is given to the attacker, where $(mathitsk,mathitpk)$ is the key pair.










share|improve this question











$endgroup$











  • $begingroup$
    We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
    $endgroup$
    – kiran
    Mar 25 at 15:04













7












7








7


2



$begingroup$


How can I design a CPA-secure encryption scheme which is secure even after the encryption of secret key is given in the training phase? I.e., in the training phase, $mathitEnc_mathitpk(mathitsk)$ is given to the attacker, where $(mathitsk,mathitpk)$ is the key pair.










share|improve this question











$endgroup$




How can I design a CPA-secure encryption scheme which is secure even after the encryption of secret key is given in the training phase? I.e., in the training phase, $mathitEnc_mathitpk(mathitsk)$ is given to the attacker, where $(mathitsk,mathitpk)$ is the key pair.







chosen-plaintext-attack






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Mar 26 at 6:08









Squeamish Ossifrage

29.1k1 gold badge44 silver badges123 bronze badges




29.1k1 gold badge44 silver badges123 bronze badges










asked Mar 25 at 8:24









kirankiran

384 bronze badges




384 bronze badges











  • $begingroup$
    We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
    $endgroup$
    – kiran
    Mar 25 at 15:04
















  • $begingroup$
    We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
    $endgroup$
    – kiran
    Mar 25 at 15:04















$begingroup$
We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
$endgroup$
– kiran
Mar 25 at 15:04




$begingroup$
We can also assume that there exists a deterministic poly time algorithm T that on input sk outputs pk.
$endgroup$
– kiran
Mar 25 at 15:04










3 Answers
3






active

oldest

votes


















7












$begingroup$

It turns out that what you are looking for is not trivial... A scheme that satisfies such property is called (CPA) circular secure scheme.



There are some schemes that satisfy that, but I don't know if they have publicly available implementions. For example, you can take a look to this scheme.



In the notation used on the paper, $ell$ is the number of pairs of public and secret keys (so, in your case, $ell = 1$). They prove a stronger security notion (KDM - Key dependent messages) that implies circular security (at least in their setting).



--EDIT--



As the other users pointed out, on the Random Oracle Model (ROM) there are other (more standard) constructions which meet this security definition. When I wrote this answer, I didn't consider this security model, but I made this unconsciously. I didn't want to say that schemes proved secure on ROM must be simply rejected. To be honest, I think that a correct answer to your question should merge my original answer with other answers and point out these details.






share|improve this answer











$endgroup$




















    9












    $begingroup$

    You're in luck! Essentially every secure public-key encryption scheme on bit strings that is actually in use already has this property—and, even better, not just IND-CPA but often IND-CCA2/NM-CCA2*—because they can all be factored into a KEM/DEM structure via a hash function $H$ like SHAKE128:




    1. (KEM) Generate a uniform random $k$ and encapsulation $y$ using $mathitpk$.



      Examples:




      • RSA-KEM: $mathitpk = n$, a large integer; choose $x$ uniformly at random in $0, 1, 2, dots, n - 1$, and compute $y = x^3 bmod n$ and $k = H(x)$.



        The recipient will recover $x = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$.




      • RSA-OAEP KEM: $mathitpk = n$, a large integer; choose $k$ and $r$ uniformly at random, compute $a = k oplus H(0 mathbin| r), b = r oplus H(1 mathbin| a)$ (of appropriate bit lengths so they fill a $lfloorlog_2 nrfloor$-bit integer), and $y = (a mathbin| b)^3 bmod n$.



        The recipient will recover $a mathbin| b = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$, and then solve for $k$.




      • DH-based KEM: $mathitpk = h$, an element of prime order in a group $G$ generated by a standard base $g$; choose $x$ uniformly at random, and compute $y = g^x$, and $k = H(h^x)$.



        The recipient will recover $k = H(y^z)$ with secret knowledge of $z$ such that $h = g^z$, so that $h^x = (g^z)^x = (g^x)^z = y^z$.





    2. (DEM) Use $k$ as a one-time key for a one-time authenticated cipher $operatornameAE$ to encrypt the message $m$ as $c = operatornameAE_k(m)$.



      Any authenticated cipher works here, like AES-GCM or crypto_secretbox_xsalsa20poly1305; technically the security requirements of a DEM are lighter than AEAD, e.g. you could just use most of $k$ as a one-time pad and the rest as a one-time authenticator key, but it is simplest—and most common—to use an authenticated cipher.



    3. Transmit $(y, c)$, the encapsulation $y$ of the one-time key $k$ and the authenticated encryption $c$ of the message $m$.


    The one-time key $k$ is (effectively) independent of the secret key $mathitsk$, so there is no problem with the symmetric encryption $operatornameAE_k(mathitsk)$ used here.



    This notion of security is sometimes called circular security or key-dependent message (KDM) security.



    • In 2001, Camenisch and Lysyanskaya defined circular security and proved that $(m, r) mapsto E_mathitpk(r) mathbin| (H(r) oplus m)$ for uniform random $r$ has it if $E_mathitpk$ is semantically secure[1].

    • Independently, in 2002, Black, Rogaway, and Shrimpton defined the slightly stronger KDM security and suggested but could not prove that KEM/DEM hybrid constructions like this would have it[2].

    • Then in 2014, Davies and Stam finally found formal techniques to prove that KEM/DEM via $H$ generically has KDM security[3].

    Skipping the hash $H$, of course, can ruin the security, as in many cryptosystems. If for some reason you need a system that is secure even without a hash, then the Camenisch–Lysyanskaya and Black–Rogaway–Shrimpton papers are a good starting point for a literature search, with over a thousand papers citing them, from a cursory glance.



    Of course, if you need additional structure—e.g., the homomorphic property of Elgamal encryption $(h^r, g^r m)$ for a highly restricted message space—then the answer may be different, because such additional structure is incompatible with NM-CCA2. But in that case, you'll need to ask a more specific question about your specific additional structure.




    * Well, some of the practical ones fail IND-CCA2/NM-CCA2, like S/MIME and OpenPGP, because their designers made foolish decisions leading to EFAIL[4]. But those particular mistakes don't imply problems with circular/KDM security: they are still effectively factored into KEM/not-quite-DEM.



    In academic cryptography jargon, the security here is usually presented in the ‘random oracle model’. Essentially, this means that we can prove any attacker that doesn't depend on the details of $H$ can be used, if parametrized by $H$, as a subroutine in a procedure to factor large semiprimes, compute discrete logs, etc. In principle, it could be that particular choices of hash function $H$ could interact with the public-key mathematical structure to enable other attacks; pathological examples have been exhibited[5] where any choice of hash function is insecure. But these pathological examples are of little consequence in the real world, and they give no reason to doubt the practical security of the KEMs actually in widespread use today like these; these pathological examples are more of an interesting quirk of the formalism than anything else. More on the random oracle model.






    share|improve this answer











    $endgroup$








    • 2




      $begingroup$
      The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
      $endgroup$
      – OrangeDog
      Mar 25 at 18:24






    • 2




      $begingroup$
      @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
      $endgroup$
      – Squeamish Ossifrage
      Mar 25 at 22:18










    • $begingroup$
      @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
      $endgroup$
      – Squeamish Ossifrage
      Mar 25 at 22:23







    • 1




      $begingroup$
      @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
      $endgroup$
      – Squeamish Ossifrage
      Mar 25 at 22:36











    • $begingroup$
      Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
      $endgroup$
      – kiran
      Mar 26 at 14:30


















    4












    $begingroup$

    This is secure for practically all hybrid asymmetric encryption algorithms, like ECIES or RSA-KEM. However it violates the security assumptions of the standard model, so you have to resort to the random oracle model.



    I would avoid overly complicated designs, like those from the paper Hilder mentions, just for the sake of a standard model security proof.






    share|improve this answer









    $endgroup$















      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "281"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: false,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: null,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      noCode: true, onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );













      draft saved

      draft discarded


















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68270%2fis-it-possible-to-build-a-cpa-secure-encryption-scheme-which-remains-secure-even%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown

























      3 Answers
      3






      active

      oldest

      votes








      3 Answers
      3






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      7












      $begingroup$

      It turns out that what you are looking for is not trivial... A scheme that satisfies such property is called (CPA) circular secure scheme.



      There are some schemes that satisfy that, but I don't know if they have publicly available implementions. For example, you can take a look to this scheme.



      In the notation used on the paper, $ell$ is the number of pairs of public and secret keys (so, in your case, $ell = 1$). They prove a stronger security notion (KDM - Key dependent messages) that implies circular security (at least in their setting).



      --EDIT--



      As the other users pointed out, on the Random Oracle Model (ROM) there are other (more standard) constructions which meet this security definition. When I wrote this answer, I didn't consider this security model, but I made this unconsciously. I didn't want to say that schemes proved secure on ROM must be simply rejected. To be honest, I think that a correct answer to your question should merge my original answer with other answers and point out these details.






      share|improve this answer











      $endgroup$

















        7












        $begingroup$

        It turns out that what you are looking for is not trivial... A scheme that satisfies such property is called (CPA) circular secure scheme.



        There are some schemes that satisfy that, but I don't know if they have publicly available implementions. For example, you can take a look to this scheme.



        In the notation used on the paper, $ell$ is the number of pairs of public and secret keys (so, in your case, $ell = 1$). They prove a stronger security notion (KDM - Key dependent messages) that implies circular security (at least in their setting).



        --EDIT--



        As the other users pointed out, on the Random Oracle Model (ROM) there are other (more standard) constructions which meet this security definition. When I wrote this answer, I didn't consider this security model, but I made this unconsciously. I didn't want to say that schemes proved secure on ROM must be simply rejected. To be honest, I think that a correct answer to your question should merge my original answer with other answers and point out these details.






        share|improve this answer











        $endgroup$















          7












          7








          7





          $begingroup$

          It turns out that what you are looking for is not trivial... A scheme that satisfies such property is called (CPA) circular secure scheme.



          There are some schemes that satisfy that, but I don't know if they have publicly available implementions. For example, you can take a look to this scheme.



          In the notation used on the paper, $ell$ is the number of pairs of public and secret keys (so, in your case, $ell = 1$). They prove a stronger security notion (KDM - Key dependent messages) that implies circular security (at least in their setting).



          --EDIT--



          As the other users pointed out, on the Random Oracle Model (ROM) there are other (more standard) constructions which meet this security definition. When I wrote this answer, I didn't consider this security model, but I made this unconsciously. I didn't want to say that schemes proved secure on ROM must be simply rejected. To be honest, I think that a correct answer to your question should merge my original answer with other answers and point out these details.






          share|improve this answer











          $endgroup$



          It turns out that what you are looking for is not trivial... A scheme that satisfies such property is called (CPA) circular secure scheme.



          There are some schemes that satisfy that, but I don't know if they have publicly available implementions. For example, you can take a look to this scheme.



          In the notation used on the paper, $ell$ is the number of pairs of public and secret keys (so, in your case, $ell = 1$). They prove a stronger security notion (KDM - Key dependent messages) that implies circular security (at least in their setting).



          --EDIT--



          As the other users pointed out, on the Random Oracle Model (ROM) there are other (more standard) constructions which meet this security definition. When I wrote this answer, I didn't consider this security model, but I made this unconsciously. I didn't want to say that schemes proved secure on ROM must be simply rejected. To be honest, I think that a correct answer to your question should merge my original answer with other answers and point out these details.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Mar 26 at 7:51

























          answered Mar 25 at 9:56









          Hilder Vítor Lima PereiraHilder Vítor Lima Pereira

          4,0999 silver badges31 bronze badges




          4,0999 silver badges31 bronze badges























              9












              $begingroup$

              You're in luck! Essentially every secure public-key encryption scheme on bit strings that is actually in use already has this property—and, even better, not just IND-CPA but often IND-CCA2/NM-CCA2*—because they can all be factored into a KEM/DEM structure via a hash function $H$ like SHAKE128:




              1. (KEM) Generate a uniform random $k$ and encapsulation $y$ using $mathitpk$.



                Examples:




                • RSA-KEM: $mathitpk = n$, a large integer; choose $x$ uniformly at random in $0, 1, 2, dots, n - 1$, and compute $y = x^3 bmod n$ and $k = H(x)$.



                  The recipient will recover $x = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$.




                • RSA-OAEP KEM: $mathitpk = n$, a large integer; choose $k$ and $r$ uniformly at random, compute $a = k oplus H(0 mathbin| r), b = r oplus H(1 mathbin| a)$ (of appropriate bit lengths so they fill a $lfloorlog_2 nrfloor$-bit integer), and $y = (a mathbin| b)^3 bmod n$.



                  The recipient will recover $a mathbin| b = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$, and then solve for $k$.




                • DH-based KEM: $mathitpk = h$, an element of prime order in a group $G$ generated by a standard base $g$; choose $x$ uniformly at random, and compute $y = g^x$, and $k = H(h^x)$.



                  The recipient will recover $k = H(y^z)$ with secret knowledge of $z$ such that $h = g^z$, so that $h^x = (g^z)^x = (g^x)^z = y^z$.





              2. (DEM) Use $k$ as a one-time key for a one-time authenticated cipher $operatornameAE$ to encrypt the message $m$ as $c = operatornameAE_k(m)$.



                Any authenticated cipher works here, like AES-GCM or crypto_secretbox_xsalsa20poly1305; technically the security requirements of a DEM are lighter than AEAD, e.g. you could just use most of $k$ as a one-time pad and the rest as a one-time authenticator key, but it is simplest—and most common—to use an authenticated cipher.



              3. Transmit $(y, c)$, the encapsulation $y$ of the one-time key $k$ and the authenticated encryption $c$ of the message $m$.


              The one-time key $k$ is (effectively) independent of the secret key $mathitsk$, so there is no problem with the symmetric encryption $operatornameAE_k(mathitsk)$ used here.



              This notion of security is sometimes called circular security or key-dependent message (KDM) security.



              • In 2001, Camenisch and Lysyanskaya defined circular security and proved that $(m, r) mapsto E_mathitpk(r) mathbin| (H(r) oplus m)$ for uniform random $r$ has it if $E_mathitpk$ is semantically secure[1].

              • Independently, in 2002, Black, Rogaway, and Shrimpton defined the slightly stronger KDM security and suggested but could not prove that KEM/DEM hybrid constructions like this would have it[2].

              • Then in 2014, Davies and Stam finally found formal techniques to prove that KEM/DEM via $H$ generically has KDM security[3].

              Skipping the hash $H$, of course, can ruin the security, as in many cryptosystems. If for some reason you need a system that is secure even without a hash, then the Camenisch–Lysyanskaya and Black–Rogaway–Shrimpton papers are a good starting point for a literature search, with over a thousand papers citing them, from a cursory glance.



              Of course, if you need additional structure—e.g., the homomorphic property of Elgamal encryption $(h^r, g^r m)$ for a highly restricted message space—then the answer may be different, because such additional structure is incompatible with NM-CCA2. But in that case, you'll need to ask a more specific question about your specific additional structure.




              * Well, some of the practical ones fail IND-CCA2/NM-CCA2, like S/MIME and OpenPGP, because their designers made foolish decisions leading to EFAIL[4]. But those particular mistakes don't imply problems with circular/KDM security: they are still effectively factored into KEM/not-quite-DEM.



              In academic cryptography jargon, the security here is usually presented in the ‘random oracle model’. Essentially, this means that we can prove any attacker that doesn't depend on the details of $H$ can be used, if parametrized by $H$, as a subroutine in a procedure to factor large semiprimes, compute discrete logs, etc. In principle, it could be that particular choices of hash function $H$ could interact with the public-key mathematical structure to enable other attacks; pathological examples have been exhibited[5] where any choice of hash function is insecure. But these pathological examples are of little consequence in the real world, and they give no reason to doubt the practical security of the KEMs actually in widespread use today like these; these pathological examples are more of an interesting quirk of the formalism than anything else. More on the random oracle model.






              share|improve this answer











              $endgroup$








              • 2




                $begingroup$
                The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
                $endgroup$
                – OrangeDog
                Mar 25 at 18:24






              • 2




                $begingroup$
                @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:18










              • $begingroup$
                @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:23







              • 1




                $begingroup$
                @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:36











              • $begingroup$
                Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
                $endgroup$
                – kiran
                Mar 26 at 14:30















              9












              $begingroup$

              You're in luck! Essentially every secure public-key encryption scheme on bit strings that is actually in use already has this property—and, even better, not just IND-CPA but often IND-CCA2/NM-CCA2*—because they can all be factored into a KEM/DEM structure via a hash function $H$ like SHAKE128:




              1. (KEM) Generate a uniform random $k$ and encapsulation $y$ using $mathitpk$.



                Examples:




                • RSA-KEM: $mathitpk = n$, a large integer; choose $x$ uniformly at random in $0, 1, 2, dots, n - 1$, and compute $y = x^3 bmod n$ and $k = H(x)$.



                  The recipient will recover $x = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$.




                • RSA-OAEP KEM: $mathitpk = n$, a large integer; choose $k$ and $r$ uniformly at random, compute $a = k oplus H(0 mathbin| r), b = r oplus H(1 mathbin| a)$ (of appropriate bit lengths so they fill a $lfloorlog_2 nrfloor$-bit integer), and $y = (a mathbin| b)^3 bmod n$.



                  The recipient will recover $a mathbin| b = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$, and then solve for $k$.




                • DH-based KEM: $mathitpk = h$, an element of prime order in a group $G$ generated by a standard base $g$; choose $x$ uniformly at random, and compute $y = g^x$, and $k = H(h^x)$.



                  The recipient will recover $k = H(y^z)$ with secret knowledge of $z$ such that $h = g^z$, so that $h^x = (g^z)^x = (g^x)^z = y^z$.





              2. (DEM) Use $k$ as a one-time key for a one-time authenticated cipher $operatornameAE$ to encrypt the message $m$ as $c = operatornameAE_k(m)$.



                Any authenticated cipher works here, like AES-GCM or crypto_secretbox_xsalsa20poly1305; technically the security requirements of a DEM are lighter than AEAD, e.g. you could just use most of $k$ as a one-time pad and the rest as a one-time authenticator key, but it is simplest—and most common—to use an authenticated cipher.



              3. Transmit $(y, c)$, the encapsulation $y$ of the one-time key $k$ and the authenticated encryption $c$ of the message $m$.


              The one-time key $k$ is (effectively) independent of the secret key $mathitsk$, so there is no problem with the symmetric encryption $operatornameAE_k(mathitsk)$ used here.



              This notion of security is sometimes called circular security or key-dependent message (KDM) security.



              • In 2001, Camenisch and Lysyanskaya defined circular security and proved that $(m, r) mapsto E_mathitpk(r) mathbin| (H(r) oplus m)$ for uniform random $r$ has it if $E_mathitpk$ is semantically secure[1].

              • Independently, in 2002, Black, Rogaway, and Shrimpton defined the slightly stronger KDM security and suggested but could not prove that KEM/DEM hybrid constructions like this would have it[2].

              • Then in 2014, Davies and Stam finally found formal techniques to prove that KEM/DEM via $H$ generically has KDM security[3].

              Skipping the hash $H$, of course, can ruin the security, as in many cryptosystems. If for some reason you need a system that is secure even without a hash, then the Camenisch–Lysyanskaya and Black–Rogaway–Shrimpton papers are a good starting point for a literature search, with over a thousand papers citing them, from a cursory glance.



              Of course, if you need additional structure—e.g., the homomorphic property of Elgamal encryption $(h^r, g^r m)$ for a highly restricted message space—then the answer may be different, because such additional structure is incompatible with NM-CCA2. But in that case, you'll need to ask a more specific question about your specific additional structure.




              * Well, some of the practical ones fail IND-CCA2/NM-CCA2, like S/MIME and OpenPGP, because their designers made foolish decisions leading to EFAIL[4]. But those particular mistakes don't imply problems with circular/KDM security: they are still effectively factored into KEM/not-quite-DEM.



              In academic cryptography jargon, the security here is usually presented in the ‘random oracle model’. Essentially, this means that we can prove any attacker that doesn't depend on the details of $H$ can be used, if parametrized by $H$, as a subroutine in a procedure to factor large semiprimes, compute discrete logs, etc. In principle, it could be that particular choices of hash function $H$ could interact with the public-key mathematical structure to enable other attacks; pathological examples have been exhibited[5] where any choice of hash function is insecure. But these pathological examples are of little consequence in the real world, and they give no reason to doubt the practical security of the KEMs actually in widespread use today like these; these pathological examples are more of an interesting quirk of the formalism than anything else. More on the random oracle model.






              share|improve this answer











              $endgroup$








              • 2




                $begingroup$
                The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
                $endgroup$
                – OrangeDog
                Mar 25 at 18:24






              • 2




                $begingroup$
                @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:18










              • $begingroup$
                @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:23







              • 1




                $begingroup$
                @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:36











              • $begingroup$
                Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
                $endgroup$
                – kiran
                Mar 26 at 14:30













              9












              9








              9





              $begingroup$

              You're in luck! Essentially every secure public-key encryption scheme on bit strings that is actually in use already has this property—and, even better, not just IND-CPA but often IND-CCA2/NM-CCA2*—because they can all be factored into a KEM/DEM structure via a hash function $H$ like SHAKE128:




              1. (KEM) Generate a uniform random $k$ and encapsulation $y$ using $mathitpk$.



                Examples:




                • RSA-KEM: $mathitpk = n$, a large integer; choose $x$ uniformly at random in $0, 1, 2, dots, n - 1$, and compute $y = x^3 bmod n$ and $k = H(x)$.



                  The recipient will recover $x = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$.




                • RSA-OAEP KEM: $mathitpk = n$, a large integer; choose $k$ and $r$ uniformly at random, compute $a = k oplus H(0 mathbin| r), b = r oplus H(1 mathbin| a)$ (of appropriate bit lengths so they fill a $lfloorlog_2 nrfloor$-bit integer), and $y = (a mathbin| b)^3 bmod n$.



                  The recipient will recover $a mathbin| b = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$, and then solve for $k$.




                • DH-based KEM: $mathitpk = h$, an element of prime order in a group $G$ generated by a standard base $g$; choose $x$ uniformly at random, and compute $y = g^x$, and $k = H(h^x)$.



                  The recipient will recover $k = H(y^z)$ with secret knowledge of $z$ such that $h = g^z$, so that $h^x = (g^z)^x = (g^x)^z = y^z$.





              2. (DEM) Use $k$ as a one-time key for a one-time authenticated cipher $operatornameAE$ to encrypt the message $m$ as $c = operatornameAE_k(m)$.



                Any authenticated cipher works here, like AES-GCM or crypto_secretbox_xsalsa20poly1305; technically the security requirements of a DEM are lighter than AEAD, e.g. you could just use most of $k$ as a one-time pad and the rest as a one-time authenticator key, but it is simplest—and most common—to use an authenticated cipher.



              3. Transmit $(y, c)$, the encapsulation $y$ of the one-time key $k$ and the authenticated encryption $c$ of the message $m$.


              The one-time key $k$ is (effectively) independent of the secret key $mathitsk$, so there is no problem with the symmetric encryption $operatornameAE_k(mathitsk)$ used here.



              This notion of security is sometimes called circular security or key-dependent message (KDM) security.



              • In 2001, Camenisch and Lysyanskaya defined circular security and proved that $(m, r) mapsto E_mathitpk(r) mathbin| (H(r) oplus m)$ for uniform random $r$ has it if $E_mathitpk$ is semantically secure[1].

              • Independently, in 2002, Black, Rogaway, and Shrimpton defined the slightly stronger KDM security and suggested but could not prove that KEM/DEM hybrid constructions like this would have it[2].

              • Then in 2014, Davies and Stam finally found formal techniques to prove that KEM/DEM via $H$ generically has KDM security[3].

              Skipping the hash $H$, of course, can ruin the security, as in many cryptosystems. If for some reason you need a system that is secure even without a hash, then the Camenisch–Lysyanskaya and Black–Rogaway–Shrimpton papers are a good starting point for a literature search, with over a thousand papers citing them, from a cursory glance.



              Of course, if you need additional structure—e.g., the homomorphic property of Elgamal encryption $(h^r, g^r m)$ for a highly restricted message space—then the answer may be different, because such additional structure is incompatible with NM-CCA2. But in that case, you'll need to ask a more specific question about your specific additional structure.




              * Well, some of the practical ones fail IND-CCA2/NM-CCA2, like S/MIME and OpenPGP, because their designers made foolish decisions leading to EFAIL[4]. But those particular mistakes don't imply problems with circular/KDM security: they are still effectively factored into KEM/not-quite-DEM.



              In academic cryptography jargon, the security here is usually presented in the ‘random oracle model’. Essentially, this means that we can prove any attacker that doesn't depend on the details of $H$ can be used, if parametrized by $H$, as a subroutine in a procedure to factor large semiprimes, compute discrete logs, etc. In principle, it could be that particular choices of hash function $H$ could interact with the public-key mathematical structure to enable other attacks; pathological examples have been exhibited[5] where any choice of hash function is insecure. But these pathological examples are of little consequence in the real world, and they give no reason to doubt the practical security of the KEMs actually in widespread use today like these; these pathological examples are more of an interesting quirk of the formalism than anything else. More on the random oracle model.






              share|improve this answer











              $endgroup$



              You're in luck! Essentially every secure public-key encryption scheme on bit strings that is actually in use already has this property—and, even better, not just IND-CPA but often IND-CCA2/NM-CCA2*—because they can all be factored into a KEM/DEM structure via a hash function $H$ like SHAKE128:




              1. (KEM) Generate a uniform random $k$ and encapsulation $y$ using $mathitpk$.



                Examples:




                • RSA-KEM: $mathitpk = n$, a large integer; choose $x$ uniformly at random in $0, 1, 2, dots, n - 1$, and compute $y = x^3 bmod n$ and $k = H(x)$.



                  The recipient will recover $x = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$.




                • RSA-OAEP KEM: $mathitpk = n$, a large integer; choose $k$ and $r$ uniformly at random, compute $a = k oplus H(0 mathbin| r), b = r oplus H(1 mathbin| a)$ (of appropriate bit lengths so they fill a $lfloorlog_2 nrfloor$-bit integer), and $y = (a mathbin| b)^3 bmod n$.



                  The recipient will recover $a mathbin| b = y^d bmod n$ with secret knowledge of $d equiv e^-1 pmodlambda(n)$, and then solve for $k$.




                • DH-based KEM: $mathitpk = h$, an element of prime order in a group $G$ generated by a standard base $g$; choose $x$ uniformly at random, and compute $y = g^x$, and $k = H(h^x)$.



                  The recipient will recover $k = H(y^z)$ with secret knowledge of $z$ such that $h = g^z$, so that $h^x = (g^z)^x = (g^x)^z = y^z$.





              2. (DEM) Use $k$ as a one-time key for a one-time authenticated cipher $operatornameAE$ to encrypt the message $m$ as $c = operatornameAE_k(m)$.



                Any authenticated cipher works here, like AES-GCM or crypto_secretbox_xsalsa20poly1305; technically the security requirements of a DEM are lighter than AEAD, e.g. you could just use most of $k$ as a one-time pad and the rest as a one-time authenticator key, but it is simplest—and most common—to use an authenticated cipher.



              3. Transmit $(y, c)$, the encapsulation $y$ of the one-time key $k$ and the authenticated encryption $c$ of the message $m$.


              The one-time key $k$ is (effectively) independent of the secret key $mathitsk$, so there is no problem with the symmetric encryption $operatornameAE_k(mathitsk)$ used here.



              This notion of security is sometimes called circular security or key-dependent message (KDM) security.



              • In 2001, Camenisch and Lysyanskaya defined circular security and proved that $(m, r) mapsto E_mathitpk(r) mathbin| (H(r) oplus m)$ for uniform random $r$ has it if $E_mathitpk$ is semantically secure[1].

              • Independently, in 2002, Black, Rogaway, and Shrimpton defined the slightly stronger KDM security and suggested but could not prove that KEM/DEM hybrid constructions like this would have it[2].

              • Then in 2014, Davies and Stam finally found formal techniques to prove that KEM/DEM via $H$ generically has KDM security[3].

              Skipping the hash $H$, of course, can ruin the security, as in many cryptosystems. If for some reason you need a system that is secure even without a hash, then the Camenisch–Lysyanskaya and Black–Rogaway–Shrimpton papers are a good starting point for a literature search, with over a thousand papers citing them, from a cursory glance.



              Of course, if you need additional structure—e.g., the homomorphic property of Elgamal encryption $(h^r, g^r m)$ for a highly restricted message space—then the answer may be different, because such additional structure is incompatible with NM-CCA2. But in that case, you'll need to ask a more specific question about your specific additional structure.




              * Well, some of the practical ones fail IND-CCA2/NM-CCA2, like S/MIME and OpenPGP, because their designers made foolish decisions leading to EFAIL[4]. But those particular mistakes don't imply problems with circular/KDM security: they are still effectively factored into KEM/not-quite-DEM.



              In academic cryptography jargon, the security here is usually presented in the ‘random oracle model’. Essentially, this means that we can prove any attacker that doesn't depend on the details of $H$ can be used, if parametrized by $H$, as a subroutine in a procedure to factor large semiprimes, compute discrete logs, etc. In principle, it could be that particular choices of hash function $H$ could interact with the public-key mathematical structure to enable other attacks; pathological examples have been exhibited[5] where any choice of hash function is insecure. But these pathological examples are of little consequence in the real world, and they give no reason to doubt the practical security of the KEMs actually in widespread use today like these; these pathological examples are more of an interesting quirk of the formalism than anything else. More on the random oracle model.







              share|improve this answer














              share|improve this answer



              share|improve this answer








              edited Mar 26 at 18:13

























              answered Mar 25 at 15:33









              Squeamish OssifrageSqueamish Ossifrage

              29.1k1 gold badge44 silver badges123 bronze badges




              29.1k1 gold badge44 silver badges123 bronze badges







              • 2




                $begingroup$
                The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
                $endgroup$
                – OrangeDog
                Mar 25 at 18:24






              • 2




                $begingroup$
                @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:18










              • $begingroup$
                @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:23







              • 1




                $begingroup$
                @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:36











              • $begingroup$
                Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
                $endgroup$
                – kiran
                Mar 26 at 14:30












              • 2




                $begingroup$
                The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
                $endgroup$
                – OrangeDog
                Mar 25 at 18:24






              • 2




                $begingroup$
                @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:18










              • $begingroup$
                @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:23







              • 1




                $begingroup$
                @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
                $endgroup$
                – Squeamish Ossifrage
                Mar 25 at 22:36











              • $begingroup$
                Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
                $endgroup$
                – kiran
                Mar 26 at 14:30







              2




              2




              $begingroup$
              The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
              $endgroup$
              – OrangeDog
              Mar 25 at 18:24




              $begingroup$
              The accepted answer (from Hilder Vítor) appears to contradict you. Is it because you are dismissing the "pathological examples"?
              $endgroup$
              – OrangeDog
              Mar 25 at 18:24




              2




              2




              $begingroup$
              @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:18




              $begingroup$
              @OrangeDog It would seem that Hilder tacitly rejects the random oracle model altogether—which flies in the face of essentially all public-key cryptography in practice. This is a perspective taken by some academic cryptography theoreticians, but it explains why one can't find practical implementations: because practitioners are justifiably unconcerned by the contortions that Canetti–Goldreich–Halevi go through to exhibit pathological counterexamples. By the same token, one might reject SHA-3 because there's technically no formalization of its ‘collision resistance’, per se.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:18












              $begingroup$
              @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:23





              $begingroup$
              @OrangeDog In particular, Canetti–Goldreich–Halevi concoct a signature scheme leaks the private key on inputs of the form $(x, H(x), pi)$ where $pi$ is a valid proof that $(x, H(x))$ is in the graph of some fixed polynomial-time function ensemble, which has negligible probability when $H$ is a uniform random function so the scheme is ROM-secure, but can be exhibited easily when $H$ is drawn from any concrete family of functions so the scheme is not instantiable. In other words, it's a signature scheme that by construction throws a tantrum if you instantiate it in practice.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:23





              1




              1




              $begingroup$
              @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:36





              $begingroup$
              @OrangeDog The theoretical concern high in the ivory tower is that a counterexample proves that ROM security doesn't imply concrete security. The sensible inference is not that schemes with ROM security should be silently ignored. Rather, there is probably some technical criterion separating the pathologically hopeless cases like Canetti–Goldreich–Halevi's tantrum-throwing signatures from real schemes we actually use, which we haven't identified yet. It's not the only such academic problem: collision resistance, free precomputation, etc., also have technical issues of little consequence.
              $endgroup$
              – Squeamish Ossifrage
              Mar 25 at 22:36













              $begingroup$
              Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
              $endgroup$
              – kiran
              Mar 26 at 14:30




              $begingroup$
              Actually what you are refering to is a hybrid encryption scheme, however I am only looking for a public key encryption scheme.
              $endgroup$
              – kiran
              Mar 26 at 14:30











              4












              $begingroup$

              This is secure for practically all hybrid asymmetric encryption algorithms, like ECIES or RSA-KEM. However it violates the security assumptions of the standard model, so you have to resort to the random oracle model.



              I would avoid overly complicated designs, like those from the paper Hilder mentions, just for the sake of a standard model security proof.






              share|improve this answer









              $endgroup$

















                4












                $begingroup$

                This is secure for practically all hybrid asymmetric encryption algorithms, like ECIES or RSA-KEM. However it violates the security assumptions of the standard model, so you have to resort to the random oracle model.



                I would avoid overly complicated designs, like those from the paper Hilder mentions, just for the sake of a standard model security proof.






                share|improve this answer









                $endgroup$















                  4












                  4








                  4





                  $begingroup$

                  This is secure for practically all hybrid asymmetric encryption algorithms, like ECIES or RSA-KEM. However it violates the security assumptions of the standard model, so you have to resort to the random oracle model.



                  I would avoid overly complicated designs, like those from the paper Hilder mentions, just for the sake of a standard model security proof.






                  share|improve this answer









                  $endgroup$



                  This is secure for practically all hybrid asymmetric encryption algorithms, like ECIES or RSA-KEM. However it violates the security assumptions of the standard model, so you have to resort to the random oracle model.



                  I would avoid overly complicated designs, like those from the paper Hilder mentions, just for the sake of a standard model security proof.







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Mar 25 at 11:50









                  user66919user66919

                  411 bronze badge




                  411 bronze badge



























                      draft saved

                      draft discarded
















































                      Thanks for contributing an answer to Cryptography Stack Exchange!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      Use MathJax to format equations. MathJax reference.


                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f68270%2fis-it-possible-to-build-a-cpa-secure-encryption-scheme-which-remains-secure-even%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown







                      Popular posts from this blog

                      Kamusi Yaliyomo Aina za kamusi | Muundo wa kamusi | Faida za kamusi | Dhima ya picha katika kamusi | Marejeo | Tazama pia | Viungo vya nje | UrambazajiKuhusu kamusiGo-SwahiliWiki-KamusiKamusi ya Kiswahili na Kiingerezakuihariri na kuongeza habari

                      SQL error code 1064 with creating Laravel foreign keysForeign key constraints: When to use ON UPDATE and ON DELETEDropping column with foreign key Laravel error: General error: 1025 Error on renameLaravel SQL Can't create tableLaravel Migration foreign key errorLaravel php artisan migrate:refresh giving a syntax errorSQLSTATE[42S01]: Base table or view already exists or Base table or view already exists: 1050 Tableerror in migrating laravel file to xampp serverSyntax error or access violation: 1064:syntax to use near 'unsigned not null, modelName varchar(191) not null, title varchar(191) not nLaravel cannot create new table field in mysqlLaravel 5.7:Last migration creates table but is not registered in the migration table

                      은진 송씨 목차 역사 본관 분파 인물 조선 왕실과의 인척 관계 집성촌 항렬자 인구 같이 보기 각주 둘러보기 메뉴은진 송씨세종실록 149권, 지리지 충청도 공주목 은진현