International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Fujisaki-Okamoto IND-CCA hybrid encryption revisited

Authors:
David Galindo
Sebastià Martín Molleví
Paz Morillo
Jorge Luis Villar
Download:
URL: http://eprint.iacr.org/2003/107
Search ePrint
Search Google
Abstract: At Crypto'99, Fujisaki and Okamoto~\cite{FO99} presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. From this transformation, two specific candidates to standardization were designed: EPOC-2~\cite{EPOC} and PSEC-2~\cite{PSEC}, based on Okamoto-Uchiyama and El Gamal primitives, respectively. Since then, several cryptanalysis of EPOC have been published, one in the Chosen Ciphertext Attack game and others making use of a poor implementation that is vulnerable to reject timing attacks. The aim of this work is to avoid these attacks from the generic transformation, identifying the properties that an asymmetric scheme must hold to obtain a secure hybrid scheme. To achieve this, some ambiguities in the proof of the generic transformation~\cite{FO99} are described, which can lead to false claims. As a result the original conversion is modified and the range of asymmetric primitives that can be used is shortened. In second place, the concept of {\it Easy Verifiable Primitive} is formalized, showing its connection with the Gap problems. Making use of these ideas, a {\it new} security proof for the modified transformation is given. The good news is that the reduction is {\it tight}, improving the concrete security claimed in the original work for the Easy Verifiable Primitives. For the rest of primitives the concrete security is improved at the cost of stronger assumptions. Finally, the resistance of the new conversion against reject timing attacks is addressed.
BibTeX
@misc{eprint-2003-11822,
  title={Fujisaki-Okamoto IND-CCA hybrid encryption revisited},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / chosen-ciphertext security, tight reduction,},
  url={http://eprint.iacr.org/2003/107},
  note={ dgalindo@mat.upc.es 12200 received 28 May 2003},
  author={David Galindo and Sebastià Martín Molleví and Paz Morillo and Jorge Luis Villar},
  year=2003
}