International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Circular Security Is Complete for KDM Security

Authors:
Fuyuki Kitagawa
Takahiro Matsuda
Download:
DOI: 10.1007/978-3-030-64837-4_9
Search ePrint
Search Google
Abstract: Circular security is the most elementary form of key-dependent message (KDM) security, which allows us to securely encrypt only a copy of secret key bits. In this work, we show that circular security is complete for KDM security in the sense that an encryption scheme satisfying this security notion can be transformed into one satisfying KDM security with respect to all functions computable by a-priori bounded-size circuits (bounded-KDM security). This result holds in the presence of any number of keys and in any of secret-key/public-key and CPA/CCA settings. Such a completeness result was previously shown by Applebaum (EUROCRYPT 2011) for KDM security with respect to projection functions (projection-KDM security) that allows us to securely encrypt both a copy and a negation of secret key bits. Besides amplifying the strength of KDM security, our transformation in fact can start from an encryption scheme satisfying circular security against CPA attacks and results in one satisfying bounded-KDM security against CCA attacks. This result improves the recent result by Kitagawa and Matsuda (TCC 2019) showing a CPA-to-CCA transformation for KDM secure public-key encryption schemes.
Video from ASIACRYPT 2020
BibTeX
@article{asiacrypt-2020-30714,
  title={Circular Security Is Complete for KDM Security},
  booktitle={Advances in Cryptology - ASIACRYPT 2020},
  publisher={Springer},
  doi={10.1007/978-3-030-64837-4_9},
  author={Fuyuki Kitagawa and Takahiro Matsuda},
  year=2020
}