Topics in Cryptology Ctrsa 2019 The Cryptographers Track at The Rsa Conference 2019 San Francisco Ca Usa March 48 2019 Proceedings Mitsuru Matsui Download
Topics in Cryptology Ctrsa 2019 The Cryptographers Track at The Rsa Conference 2019 San Francisco Ca Usa March 48 2019 Proceedings Mitsuru Matsui Download
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2009-the-
cryptographers-track-at-the-rsa-conference-2009-san-francisco-ca-usa-
april-2024-2009-proceedings-1st-edition-benot-libert-2040170
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2010-the-
cryptographers-track-at-the-rsa-conference-2010-san-francisco-ca-usa-
march-15-2010-proceedings-1st-edition-bart-preneel-auth-4143666
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2012-the-
cryptographers-track-at-the-rsa-conference-2012-san-francisco-ca-usa-
february-27-march-2-2012-proceedings-1st-edition-amir-moradi-4143668
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2011-the-
cryptographers-track-at-the-rsa-conference-2011-san-francisco-ca-usa-
february-1418-2011-proceedings-1st-edition-marc-fischlin-4143672
Topics In Cryptology Ctrsa 2013 The Cryptographers Track At The Rsa
Conference 2013 San Franciscoca Usa February 25march 1 2013
Proceedings 1st Edition Aurlie Bauer
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2013-the-
cryptographers-track-at-the-rsa-conference-2013-san-franciscoca-usa-
february-25march-1-2013-proceedings-1st-edition-aurlie-bauer-4241740
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2016-the-
cryptographers-track-at-the-rsa-conference-2016-san-francisco-ca-usa-
february-29-march-4-2016-proceedings-1st-edition-kazue-sako-
eds-5355836
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2017-the-
cryptographers-track-at-the-rsa-conference-2017-san-francisco-ca-usa-
february-1417-2017-proceedings-1st-edition-helena-handschuh-
eds-5737326
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2010-the-
cryptographers-track-at-the-rsa-conference-2010-san-francisco-ca-usa-
march-15-2010-proceedings-1st-edition-bart-preneel-auth-1373634
https://ebookbell.com/product/topics-in-cryptology-ctrsa-2011-the-
cryptographers-track-at-the-rsa-conference-2011-san-francisco-ca-usa-
february-1418-2011-proceedings-1st-edition-marc-fischlin-1780656
Mitsuru Matsui (Ed.)
LNCS 11405
Topics in Cryptology –
CT-RSA 2019
The Cryptographers' Track at the RSA Conference 2019
San Francisco, CA, USA, March 4–8, 2019
Proceedings
123
Lecture Notes in Computer Science 11405
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
More information about this series at http://www.springer.com/series/7410
Mitsuru Matsui (Ed.)
Topics in Cryptology –
CT-RSA 2019
The Cryptographers’ Track at the RSA Conference 2019
San Francisco, CA, USA, March 4–8, 2019
Proceedings
123
Editor
Mitsuru Matsui
Mitsubishi Electric Corporation
Kamakura, Japan
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The RSA conference has been a major international event for information security
experts since its inception in 1991. It is an annual event that attracts several hundreds of
vendors and over 40,000 participants from industry, government, and academia. Since
2001, the RSA conference has included the Cryptographer’s Track (CT-RSA), which
provides a forum for current research in cryptography. CT-RSA has become a major
publication venue for cryptographers.
This volume represents the proceedings of the 2019 RSA Conference Cryptogra-
pher’s Track, which was held in San Francisco, California, during March 4–8, 2019.
A total of 75 submissions were received for review, of which 28 papers were selected
for presentation and publication. As chair of the Program Committee, I would like to
deeply thank all the authors who contributed the results of their innovative research.
My appreciation also goes to all the members of the Program Committee and their
designated external reviewers who carefully read and reviewed these submissions. The
selection process was a difficult task since each contribution had its own merits. At
least three reviewers were assigned to each submission (four if the work included a
Program Committee member as an author), and the selection process was carried out
with great professionalism and transparency.
The submission process as well as the review process and the editing of the final
proceedings were greatly simplified by the software written by Shai Halevi. I would
like to thank him for his kind support throughout the entire process. In addition to the
contributed talks, the program included a panel discussion moderated by Bart Preneel
on “Cryptography and AI.”
Program Chair
Mitsuru Matsui Mitsubishi Electric Corporation, Japan
Program Committee
Josh Benaloh Microsoft Research, USA
Alex Biryukov University of Luxembourg, Luxembourg
Alexandra Boldyreva Georgia Institute of Technology, USA
Joppe Bos NXP, Belgium
David Cash University of Chicago, USA
Jung Hee Cheon Seoul National University, South Korea
Jean-Sébastien Coron University of Luxembourg, Luxembourg
Henri Gilbert ANSSI, France
Helena Handschuh Rambus Cryptography Research, USA
Tibor Jager Paderborn University, Germany
Stanislaw Jarecki University of California at Irvine, USA
Marc Joye OneSpan, Belgium
Florian Kerschbaum University of Waterloo, Canada
Xuejia Lai Shanghai Jiao Tong University, China
Tancrède Lepoint SRI International, USA
Michael Naehrig Microsoft Research, USA
Miyako Ohkubo NICT, Japan
Elisabeth Oswald University of Bristol, UK
Léo Perrin Inria, France
David Pointcheval CNRS and Ecole Normale Supérieure, France
Bart Preneel KU Leuven and iMinds, Belgium
Reihaneh Safavi-Naini University of Calgary, Canada
Kazue Sako NEC, Japan
Peter Scholl Aarhus University, Denmark
Nigel Smart KU Leuven, Belgium and University of Bristol, UK
François-Xavier Standaert Université Catholique de Louvain, Belgium
Takeshi Sugawara The University of Electro-Communications, Japan
Mehdi Tibouchi NTT Corporation, Japan
Huaxiong Wang Nanyang Technological University, Singapore
VIII CT-RSA 2019
Additional Reviewers
Automatic Search for a Variant of Division Property Using Three Subsets . . . 412
Kai Hu and Meiqin Wang
1 Introduction
Structure-preserving cryptography is a promising paradigm which enables mod-
ular designs of advanced cryptographic protocols, due to its compatibility with
efficient non-interactive zero-knowledge proof over the same structure, such as
Groth-Sahai proof [21]. Abe et al. [3] constructed structure-preserving signa-
ture (SPS) schemes which sign on a vector of group elements. They also used
SPS to design concurrently-secure group signatures among other applications.
Camenisch et al. [10] proposed the first CCA-secure structure-preserving encryp-
tion (SPE) scheme. Specifically, their integrity check before the final step in the
decryption algorithm does not hash the ciphertext, which is often required in
other CCA-secure scheme and its presence may hinder its compatibility with
S. S. M. Chow—Supported by General Research Funds (CUHK 14210217) of the
Research Grants Council, Hong Kong.
https://doi.org/10.1007/978-3-030-12612-4_1
2 T. Zhang et al.
obtain its partial decryption key from the KGC before it can compute its user
public key. Such formulation no longer implies IBE. Consequently, Baek et al.
constructed CLE from Schnorr signatures and ElGamal PKE. This gives us hope
in designing SP-CLE without first designing SP-IBE.
Another distinctive feature of CLE is its security under strong decryption [5].
A strong decryption oracle can provide correct decryption even when the public
key of a user is replaced by the adversary, without requiring the adversary to
surrender the decryption key corresponding to the replaced public key. This level
of security has important applications in complete non-malleability [7, 14]. Many
CLE schemes, under either formulation [5,6], rely on the random oracle to simu-
late the strong decryption oracle. Dent et al. [19] proposed the first CLE scheme
featuring strong decryption in the standard model. Yet, Groth-Sahai proof can-
not prove about its ciphertext well-formedness due to the presence of a hash.
Our Contribution. We propose the first SP-CLE schemes over groups with bilin-
ear map e : G × H → GT . We first present a construction encrypting plaintexts
in GT which is secure against chosen-plaintext attacks (CPA). Then, we extend
it to support message space of G (or H). Finally, we show how to extend it for
security against replayable chosen-ciphertext attacks (RCCA). Our proofs do
not rely on random oracles; yet, they are proven in the generic group model.
To illustrate the application of SP-CLE, we then build a (partially) structure-
preserving group signature scheme with certified limited (CL) opening from our
SP-CLE. We defer the relevant introduction and motivation to Sect. 5.
2 Preliminaries
2.1 Bilinear Group
For bilinear group context G = (G, H, GT , e, p, g, h), G, H, and GT are groups of
prime order p, where g and h are random generators for G and H respectively.
A bilinear map e : G × H → GT is a non-trivial and efficiently computable
pairing function such that, for all u ∈ G, v ∈ H, a, b ∈ Z, e(ua , v b ) = e(u, v)ab .
In Type-I groups, G = H. For Type II, there exists an efficient mapping from
G to H but not the other way around. For Type III, there exists no efficient
mapping between G and H. This paper uses Type-III groups which is the most
efficient.
and user secret value uk to generate the user public-private key pair (upk, usk).
The user publishes the user public key upk and keeps the full private key usk
in private.
– Enc(mpk, upk, ID, M ) → C. This algorithm takes in the master public key
mpk, the user public key upk, and an identity ID, to encrypt a plaintext M .
– Dec(mpk, upk, usk, C) → M . This deterministic algorithm takes in the master
public key, the user public-private key pair, and a ciphertext to recover the
plaintext M , or the error symbol ⊥ when C is invalid.
– Replace Public Key. The adversary submits ID and a user public key upk
to this oracle, which replaces the previous user public key of ID to upk .
– Extract Partial Secret Key. The adversary submits an identity ID to this
oracle. This oracle returns the partial secret key psk generated for ID.
– Extract Full Private Key. The adversary supplies an identity ID to this
oracle. This oracle returns the full private key usk generated for ID.
– Strong Decrypt. The adversary supplies an identity ID and a ciphertext C.
This oracle creates a full private key usk for ID if it is not previously generated,
decrypts C with usk even if upk of ID used in C has been replaced, and sends
the plaintext to the adversary.
– Weak SV Decrypt. The adversary supplies an identity ID, a user secret
uk , and a ciphertext C to this oracle. This oracle creates usk for ID with the
real psk and uk , and decrypts C. The oracle returns the plaintext result.
Master Key Generation. C runs MKeyGen(), sends mpk to AI , and keeps msk
private.
Query Phase. The adversary AI first makes registration queries for a polyno-
mial number of identities {IDi }qi=1 . C runs pski ← Issue(msk, mpk, IDi , ppki ) and
(upki , uski ) ← UKeyGen(mpk, pski ), and publishes upki for i ∈ [1, q]. Then, AI
can make Replace Public Key, Extract Partial Secret Key, and Extract
Full Private Key queries on any registered identity, but AI cannot request for
the partial or full private key of an identity ID after replacing its upk.
Challenge. AI submits an identity ID∗ and two messages M0 , M1 to C. C aborts
this game if any of the following events happen.
– AI made Extract Full Private Key query on ID∗ .
– AI made both Replace Public Key query and Extract Partial Secret
Key query on ID∗ .
(2) One of the elements in a pairing is public: This type of pairing includes
public key-signature pairs and message-signature pairs. In our scheme, that
is e(g, S̃). The public element can be used to embed randomness r in the
ciphertext in the form of Gri or Hjr . In our scheme, such elements include g
(and R̃ below).
(3) Both elements in a pairing are private: The private elements (from the SPS
signature) are part of the user private key. This type of pairing includes only
signature-signature pairs. In our scheme, e(T, R̃) “originally” belongs to this
type. As both of the elements are private, the encryptor has no way to know
what is the SPS signature (i.e., user private key) obtained by the intended
decryptor. We thus publish R̃ as part of the user public key (which is not
allowed in the IBE setting). We remark that such treatment is not possible
for IBE since the user public key in IBE should be purely derived from the
identity instead of any random choice made by the KGC during user private
key generation.
This key pair is just the one for the SPS scheme by Abe et al. [4] with the
message space of G2 × H. Specifically, U is for the H part of the message space,
Structure-Preserving Certificateless Encryption and Its Application 9
and (Ṽ1 , Ṽ2 ) is for G2 . Note that e(g, h) and e(W1 , h) can be pre-computed,
especially when W1 is never used as is except in e(W1 , h).
$
SetUserSec(mpk) → (ppk, uk). A user randomly picks α ← Zp , computes Dα =
g α and D̃α = hα , and sets ppk = Dα and uk = D̃α .
Issue(msk, mpk, ID, ppk) → psk. For ID ∈ G and ppk = Dα ∈ G, the KGC
$
randomly chooses r ← Z∗p and computes
e(W2 , R̃)e(g, S̃)e(U, R̃) = e(W1 , h), e(T, R̃)e(ID, Ṽ1 )e(Dα , Ṽ2 ) = e(g, h).
Note that the first equation can be simplified to e(W2 · U, R̃)e(g, S̃) = e(W1 , h).
Different from the underlying signature scheme, we expect the signature to
sign on an element R̃ of itself. This remains secure in the generic group model.
UKeyGen(mpk, ppk, psk, uk) → (upk, usk). A user parses psk as (R̃, S̃, T ) and set
the key pair as
upk = (Dα , R̃), usk = (D̃α , S̃, T ) (recall: ppk = Dα and uk = D̃α ).
K = {e(W2 , R̃)e(U, R̃)/e(W1 , h)}x {e(ID, Ṽ1 )e(Dα , Ṽ2 )/e(g, h)}y /e(Dα , h)z ,
C0 = M · K, Cg = g x , CR = R̃y , Cz = g z .
K = e(W2 , R̃)x e(U, R̃)x e(W1 , h)−x · e(ID, Ṽ1 )y e(Dα , Ṽ2 )y e(g, h)−y · e(Dα , h)−z .
10 T. Zhang et al.
The second last equality holds because (R̃, S̃, T ) is a signature which satisfies
the verification equations mentioned when we describe Issue().
Efficiency. We first start with some basic observations of our scheme. The user
private key consists of 3 elements in base groups. The ciphertext consists of 3
group elements in base groups and 1 group element in the target group. The
decryption algorithm needs 3 pairings and 4 multiplications in the target group.
Comparison with the Generic Approach. It is mandatory to compare the
performance of our proposed scheme with the folklore approach of building a
CLE scheme “with certificate” [12]. Specifically, one can build a CLE scheme
from any SPS and SPE schemes in the following way. A user publishes an SPE
public key with an SPS signature on it as his public key. An encryptor encrypts to
the user using the SPE public key only if the SPS signature is verified successfully.
Instantiating this idea with the SPS due to Abe et al. [4] used in our concrete
construction, we can see that the user public key will then consists of at least 3
elements from the SPS (and at least 1 element from the SPE public key as the
CLE partial user public key). In contrast, for our concrete construction, the user
public key consists of only 2 elements in base groups, which is much shorter.
The explicit certificate verification step in the folklore approach using the
same SPS scheme as ours will require 3 multiplications in the target group and 5
pairings. While the complexity of the actual encryption steps depends on which
SPE scheme is used to instantiate this idea, the number of pairings involved is
already larger than what our proposed scheme requires. Our encryption algo-
rithm takes 5 exponentiations and 2 multiplications in base groups, 2 exponen-
tiations and 4 multiplications in the target group, and 3 pairing computations.
Theorem 1. CLE 0 is CPA-secure against Type-I and Type-II adversaries in the
generic group model (without any isomorphism between the two base groups).
To prove that CLE 0 is CPA-secure against Type-I and Type-II adversaries,
we replace the challenge ciphertext component C0∗ with a random element in GT
Structure-Preserving Certificateless Encryption and Its Application 11
and show that the adversaries cannot distinguish this simulation with the real
scheme in the generic group model. The detailed proof is in the full version.
Output C = (C0 , {Ck,M }lk=1 ) as the ciphertext (where {Ck,M } are still in GT ).
Dec(mpk, upk, usk, C) → M/⊥. Parse C as (C0 , {Ck,M }lk=1 ). For k = 1, 2, · · · , l,
compute Mk = CLE 0 .Dec(mpk0 , upk, usk, Ck,M ) and find τk such that Mk =
e(Gk , h)τk . Output M = l C0Gτk as the plaintext.
k=1 k
The scheme CLE 1 also supports plaintexts from H. If we choose H̃k ∈ H for
integer k ∈ [1, l] as part of the master public key, and encrypt the plaintext as
l
M · k=1 H̃kτk , we can then encrypt plaintext in H.
4
∧lk=1 Ck,0 = Ck,0 · e(Ui , Ãi )−xk },
i=1
σ ← OT S.Sign(osk, C0 ).
Output (C0 , {Ãi , Ca,i }4i=1 , {Ck,0 , Ck,g , Ck,R , Ck,z }lk=1 , π, σ) as the ciphertext.
Dec(mpk, upk, usk, C) → M/⊥. The decryptor first performs the following checks.
1. Parse the ciphertext C as specified in the output of the algorithm Enc().
2. Verify the equations e(g, Ca,i ) = e(Ui , Ãi ) for i ∈ [1, 4].
3. Verify the signature σ using OT S.Verify((Ã1 , Ã2 , Ã3 , Ã4 ), C0 , σ).
4. Verify the proof π using the GS.Verify() algorithm.
If any one of the four equations does not hold, or either σ or π does not pass
the verification, output ⊥. Otherwise, for k ∈ [1, l], compute
4
Mk = Ck,0 · e(Ck,g , S̃ · Ca,i )e(T, Ck,R )e(Ck,z , D̃α ).
i=1
· e(ID, Ṽ1 )yk e(Dα , Ṽ2 )yk e(g, h)−yk e(Dα , h)−zk
4
· e(Ck,g , S̃ · Ca,i )e(T, Ck,R )e(Ck,z , D̃α )
i=1
14 T. Zhang et al.
4
4
= Mk · e(W2 , R̃)xk e(U, R̃)xk · e(Ui , Ãi )−xk · e(W1 , h)−xk · e(Ck,g , S̃ · Ca,i )
i=1 i=1
· e(ID, Ṽ1 )yk e(Dα , Ṽ2 )yk e(g, h)−yk · e(T, Ck,R ) · e(Dα , h)−zk · e(Ck,z , D̃α )
4
4
= Mk · (e(W2 , R̃)e(U, R̃) · e(Ui , Ãi )−1 · e(W1 , h)−1 · e(g, S̃ · Ca,i ))xk
i=1 i=1
· (e(ID, Ṽ1 )e(Dα , Ṽ2 )e(g, h)−1 · e(T, R̃))yk · e(g α , h)−zk · e(g z , hα ) = Mk .
With correct Mk , τk such that Mk = e(Gk , h)τk can be correctly recovered. With
all Mk for k ∈ [1, l], M = l C0Gτk can be correctly recovered as in Sect. 4.3.
i=1 i
booths. If some anomaly happen with a particular booth, say, the candidate is
set to be an adversarially-chosen set under the hood, independent of what is
the vote cast by the voters; only the signatures in the concerned booth will be
opened, and only the affected voters will be asked to cast a correct vote again.
CL opening also simplifies the opening process. The existing MDO function-
ality [25,30] requires the master opening key and the message-dependent key as
inputs. That means the two parties holding the corresponding keys must cooper-
ate in an honest manner. In our formulation, the master certifier and the opening
authority interact once such that latter will get the opening key of limited power,
instead of performing joint decryption in every opening. Dealing with a single
key also allows an easier zero-knowledge proof for the opening correctness.
5.2 Construction
Design Overview. We follow the two-level signature construction [8] and use
two SPS instances and one SP-CLE instance. The group manager generates
an SPS signature certID on an identity ID and a verification key vkID for an
SPS scheme as part of the user private key for ID. The user with identity ID
generates another SPS signature σ on a message M , then proves the relation of
(ID, vkID , certID ) and that of (M, σ ) without revealing ID, vkID , certID, nor σ .
To implement the certified limited opening feature using SP-CLE, the KGC
(as the master certifier) interacts with an SP-CLE user (as an opener). After
they interact in the SP-CLE key-issuing process, the opener obtains a public-
private key pair. Suppose the identity of the opener is E, the user public key pkE
will be published, and the user private key oskE will be kept secret. The signer
uses pkE to encrypt ID, then generates a proof showing that this ciphertext is
well-formed. All the proofs and this ciphertext are output as the group signature.
The party holding oskE can decrypt the ciphertext to obtain ID.
Syntax. Our definition extends the one by Sakai et al. [30]. We replace the
input of the TrapGen algorithm from a message M with an identifier E and an
opener public key, and only require the output of TrapGen but not the “master”
opening key in the Open algorithm. We also split the key generation into Setup,
MKeyGen, and Issue. A detailed definition can be found in the full version.
Our Construction. We use an our CLE scheme for M ∈ G CLE, two SPS
schemes SPS G and SPS, and a GS-proof system GS as the building blocks to
construct a structure-preserving group signature with certified limited opening.
As Groth-Sahai proof is rerandomizable, we use a structure-preserving one-time
signature OT S to enforce CCA-anonymity.
This scheme also achieves the “hidden identity” features as in hidden identity-
based signatures [17,24] since its opening mechanism can directly recover the
signer identity without relying on the existence of any membership database.
Setup(1λ ) → param. Choose a Type III bilinear group G = (G, H, GT , e, p, g, h)
which is suitable for CLE, SPS G , and SPS. Generate the common reference
string crs for GS. Output param = (G, crs).
MKeyGen() → (mpk, msk). Generate the key-pair for the underlying structure-
preserving primitives as follows.
1. The user runs (vkID , skID ) ← SPS.KeyGen(), sends (ID, vkID ) to the KGC.
2. The KGC runs certID ← SPS G .Sign(skG , (ID, vkID )), sends certID to the user.
The user sets uskID = (skID , vkID , certID ) as user private key.
TrapGen(mpk, ok, E) → (pkE , oskE ). The master certifier and an opener runs
this protocol such that the opener will get an opening key for an identity E ∈ H.
Sign(mpk, uskID , pkE , E, M ) → σ. The input E is the identity of the opener, and
pkE is the public key of the opener generated by the algorithm TrapGen. To sign
on a message M ∈ H by uskID , a user performs the following steps.
1. (ovk, osk) ← OT S.KeyGen(),
2. σ ← SPS.Sign(skID , (M, E, ovk)).
3. C ← CLE.Enc(mpkCLE , pkE , E, ID).
4. Run GS.Prove() to generate the proof
Theorem 4. The proposed group signature scheme with certified limited opening
provides traceability, anonymity, and is existentially unforgeable against adap-
tive chosen-message attack (EUF-CMA secure) if GS is an non-interactive zero-
knowledge proof, CLE is CPA/CCA secure, SPS G and SPS are both EUF-CMA
secure, and OT S is one-time secure (only for CCA-anonymity).
Structure-Preserving Certificateless Encryption and Its Application 19
6 Conclusion
We propose a series of structure-preserving certificateless encryption schemes by
extending an existing structure-preserving signature scheme. We illustrate their
applications in group signature with certified limited opening. We leave it as a
future work to use our structure-preserving certificateless encryption scheme for
other accountable privacy features, e.g., escrowed linkability [16] in which two
anonymous signatures from the same signer can only be linked by the one who
owns the private key (in our structure-preserving certificateless encryption).
Our scheme supports typical application of CLE except “encrypt to the
future” [15, 22, 29]. We leave it as an open problem to devise an SP-CLE under
the original formulation [5]. Another future work is to propose a generic way to
construct SP-CLE from any SPS scheme, without any step verifying an SPS in
the encryption algorithm. A challenge is to generically “upgrade” the complexity
assumption required for the SPS to its decisional variant required by SP-CLE.
K = {e(W2 , R̃)e(U, R̃)/e(W1 , h)}x {e(ID, Ṽ1 )e(Dα , Ṽ2 )/e(g, h)}y /e(Dα , h)z .
4
We include the following terms in the ciphertext such that i=1 {e(Ci , C̃i )} = K.
1/r2
C1 = ((W2 · U )x )r1 , C̃1 = R̃1/r1 , C2 = (IDy )r2 , C̃2 = Ṽ1 ,
1/r3
C3 = (Dα y )r3 , C̃3 = Ṽ2 , C4 = (W1 x /g y /Dα z )r4 , C̃4 = h1/r4 .
References
1. Abe, M., Chow, S.S.M., Haralambiev, K., Ohkubo, M.: Double-trapdoor anony-
mous tags for traceable signatures. Int. J. Inf. Secur. 12(1), 19–31 (2013)
2. Abe, M., David, B., Kohlweiss, M., Nishimaki, R., Ohkubo, M.: Tagged one-time
signatures: tight security and optimal tag size. In: Kurosawa, K., Hanaoka, G. (eds.)
PKC 2013. LNCS, vol. 7778, pp. 312–331. Springer, Heidelberg (2013). https://
doi.org/10.1007/978-3-642-36362-7 20
3. Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-
preserving signatures and commitments to group elements. In: Rabin, T. (ed.)
CRYPTO 2010. LNCS, vol. 6223, pp. 209–236. Springer, Heidelberg (2010).
https://doi.org/10.1007/978-3-642-14623-7 12
4. Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal structure-preserving
signatures in asymmetric bilinear groups. In: Rogaway, P. (ed.) CRYPTO 2011.
LNCS, vol. 6841, pp. 649–666. Springer, Heidelberg (2011). https://doi.org/10.
1007/978-3-642-22792-9 37
5. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih,
C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg
(2003). https://doi.org/10.1007/978-3-540-40061-5 29
6. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption with-
out pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS,
vol. 3650, pp. 134–148. Springer, Heidelberg (2005). https://doi.org/10.1007/
11556992 10
7. Barbosa, M., Farshim, P.: Relations among notions of complete non-malleability:
indistinguishability characterisation and efficient construction without random ora-
cles. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 145–163.
Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14081-5 10
8. Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: formal
definitions, simplified requirements, and a construction based on general assump-
tions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614–629.
Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-39200-9 38
9. Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from
identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007)
10. Camenisch, J., Haralambiev, K., Kohlweiss, M., Lapon, J., Naessens, V.: Structure
preserving CCA secure encryption and applications. In: Lee, D.H., Wang, X. (eds.)
ASIACRYPT 2011. LNCS, vol. 7073, pp. 89–106. Springer, Heidelberg (2011).
https://doi.org/10.1007/978-3-642-25385-0 5
11. Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In:
Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565–582. Springer, Heidel-
berg (2003). https://doi.org/10.1007/978-3-540-45146-4 33
12. Chow, S.S.M.: Certificateless encryption. In: Identity-Based Cryptography. Cryp-
tology and Information Security Series, vol. 2, pp. 135–155. IOS Press (2008)
13. Chow, S.S.M.: Real traceable signatures. In: Jacobson, M.J., Rijmen, V., Safavi-
Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 92–107. Springer, Heidelberg
(2009). https://doi.org/10.1007/978-3-642-05445-7 6
14. Chow, S.S.M., Franklin, M.K., Zhang, H.: Practical dual-receiver encryption -
soundness, complete non-malleability, and applications. In: The Cryptographer’s
Track at the RSA Conference (CT-RSA), pp. 85–105 (2014)
Structure-Preserving Certificateless Encryption and Its Application 21
15. Chow, S.S.M., Roth, V., Rieffel, E.G.: General certificateless encryption and timed-
release encryption. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008.
LNCS, vol. 5229, pp. 126–143. Springer, Heidelberg (2008). https://doi.org/10.
1007/978-3-540-85855-3 9
16. Chow, S.S.M., Susilo, W., Yuen, T.H.: Escrowed linkability of ring signatures and
its applications. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp.
175–192. Springer, Heidelberg (2006). https://doi.org/10.1007/11958239 12
17. Chow, S.S.M., Zhang, H., Zhang, T.: Real hidden identity-based signatures. In:
Financial Cryptography and Data Security (FC), pp. 21–38 (2017)
18. Dent, A.W.: A brief introduction to certificateless encryption schemes and their
infrastructures. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol.
6391, pp. 1–16. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-
16441-5 1
19. Dent, A.W., Libert, B., Paterson, K.G.: Certificateless encryption schemes strongly
secure in the standard model. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp.
344–359. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78440-
1 20
20. Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991.
LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991). https://doi.org/10.1007/
3-540-46416-6 42
21. Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups.
SIAM J. Comput. 41(5), 1193–1232 (2012)
22. Kasamatsu, K., Matsuda, T., Emura, K., Attrapadung, N., Hanaoka, G., Imai,
H.: Time-specific encryption from forward-secure encryption. In: Visconti, I., De
Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 184–204. Springer, Heidelberg
(2012). https://doi.org/10.1007/978-3-642-32928-9 11
23. Kiayias, A., Tsiounis, Y., Yung, M.: Traceable signatures. In: Cachin, C.,
Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 571–589.
Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3 34
24. Kiayias, A., Zhou, H.: Hidden identity-based signatures. IET Inf. Secur. 3(3), 119–
127 (2009)
25. Libert, B., Joye, M.: Group signatures with message-dependent opening in the
standard model. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 286–
306. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-04852-9 15
26. Libert, B., Mouhartem, F., Nguyen, K.: A lattice-based group signature scheme
with message-dependent opening. In: Manulis, M., Sadeghi, A.-R., Schneider, S.
(eds.) ACNS 2016. LNCS, vol. 9696, pp. 137–155. Springer, Cham (2016). https://
doi.org/10.1007/978-3-319-39555-5 8
27. Libert, B., Peters, T., Qian, C.: Structure-preserving chosen-ciphertext security
with shorter verifiable ciphertexts. In: Fehr, S. (ed.) PKC 2017. LNCS, vol.
10174, pp. 247–276. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-
662-54365-8 11
28. Ohara, K., Sakai, Y., Emura, K., Hanaoka, G.: A group signature scheme with
unbounded message-dependent opening. In: ACM SIGSAC Symposium on Infor-
mation, Computer and Communications Security (AsiaCCS), pp. 517–522. ACM
(2013)
29. Paterson, K.G., Quaglia, E.A.: Time-specific encryption. In: Garay, J.A., De Prisco,
R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 1–16. Springer, Heidelberg (2010).
https://doi.org/10.1007/978-3-642-15317-4 1
22 T. Zhang et al.
30. Sakai, Y., Emura, K., Hanaoka, G., Kawai, Y., Matsuda, T., Omote, K.: Group sig-
natures with message-dependent opening. In: Abdalla, M., Lange, T. (eds.) Pairing
2012. LNCS, vol. 7708, pp. 270–294. Springer, Heidelberg (2013). https://doi.org/
10.1007/978-3-642-36334-4 18
31. Sun, Y., Zhang, F., Baek, J.: Strongly secure certificateless public key encryption
without pairing. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.)
CANS 2007. LNCS, vol. 4856, pp. 194–208. Springer, Heidelberg (2007). https://
doi.org/10.1007/978-3-540-76969-9 13
32. Tsang, P.P., Chow, S.S.M., Smith, S.W.: Batch pairing delegation. In: Miyaji, A.,
Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 74–90.
Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75651-4 6
Public Key Encryption Resilient
to Post-challenge Leakage
and Tampering Attacks
https://doi.org/10.1007/978-3-030-12612-4_2
24 S. Chakraborty and C. P. Rangan
PKE scheme (without involving pairings and zero-knowledge proofs) in the BLT
model.
In all the above constructions of PKE schemes [8, 12], the adversary is allowed
to make only pre-challenge tampering queries. In other words, the adversary can
specify a bounded number (say τ ) of tampering queries Ti (i ∈ [τ ]) before the
challenge phase, and gets access to the tampered decryption oracle Dec(sk i , ·),
where sk i = Ti (sk). However, after receiving the challenge ciphertext, the adver-
sary is not allowed to make even a single tampering query. This severely restricts
the meaning and applicability of the existing security notions and that of the
resulting constructions of the cryptographic primitives satisfying these notions.
In particular, this means that even if the adversary tampers with the secret
key/memory only once, the secrecy of all the previously encrypted messages
before that tampering attempt cannot be guaranteed. However, note that, this
is not a limitation of the existing security notions or the constructions. Indeed,
as shown in [16, 20], tolerating post-challenge (also called after-the-fact) tamper-
ing in it full generality is impossible. In particular, the adversary could simply
overwrite the secret key depending on the bit b that is encrypted in the chal-
lenge ciphertext c∗ , and thus gain some advantage in guessing the value of b
by asking additional decryption queries. We refer the reader to [8, Sect. 4.4] for
the detailed attack. The above impossibility result holds even if the adversary
is allowed to make even a single post-challenge tampering query followed by a
single decryption query (with respect to the original secret key). Similar impos-
sibility result is known to hold for the setting of leakage as well, in the sense
that even if the adversary obtains a single bit of leakage in the post-challenge
phase, this is enough to completely break the security of the PKE scheme. This
is because the adversary can simply encode the decryption function with the
challenge ciphertext and the two challenge messages in the leakage function and
obtain exactly the bit b that the challenger tries to hide.
Halevi and Lin [16] addressed this issue of after-the-fact leakage, and defined
an appropriate security model, namely the split-state leakage model (more on
this below), and showed how to construct semantically-secure PKE scheme under
this restricted security model. This was later extended to handle CCA security
under the same split-state leakage model in [5,23]. However, note that, for the
case of tampering, there are no suitable security notions or definitions to handle
post-challenge tampering. This definitional problem was acknowledged in the
prior works [8,12]. However, no solution to this issue was offered. Indeed it
is mentioned in [12] that “it remains open how to obtain CCA security for
PKE against “after-the-fact” tampering and leakage, where both tampering and
leakage can still occur after the challenge ciphertext is generated”.
1
However, note that, the tampering functions may be identity functions with respect
to ciphertexts c = c∗ , where c∗ is the challenge ciphertext. This also emulates access
to the (original) decryption oracle to the adversary.
Public Key Encryption Resilient to Post-challenge Leakage 27
of [8], the adversary is allowed to make only pre-challenge leakage and tam-
pering queries. Our notion of entropic restricted post-challenge IND-CCA-BLT
security captures the following intuition: Suppose we sample a message M from a
high min-entropy distribution. Given a ciphertext encrypting M , and even given
(bounded) leakage from the secret key and access to a restricted (tampered)
decryption oracle (even if both leakage and tampering happens after observ-
ing the challenge ciphertext), the message M still retains enough min-entropy
in it. We then show that the cryptosystem of Boneh et al. [4] (referred to as
BHHO cryptosystem) satisfies our entropic restricted notion. The main idea of
our construction is the leakage to tamper reduction for the BHHO cryptosystem
as shown in [8]. Note that, using leakage to simulate tampering is non-trivial,
since for each tampered secret key the adversary can make polynomially many
(tampered) decryption oracle queries. Hence the amount of key-dependent infor-
mation that the adversary receives cannot be simulated by a small amount of
(bounded) leakage. However, as shown in [8], in case of BHHO cryptosystem
for each (pre-challenge) tampering query it is possible to simulate polynomially
many decryption queries under it by just leaking a single group element, thus
reducing tampering to leakage. We use similar ideas and show that the BHHO
cryptosystem with appropriate parameters satisfy our entropic restricted notion
of security, even if leakage and tampering is allowed in the post-challenge phase.
We note that, the work of Faonio and Venturi [12] gives a comparatively efficient
construction of IND-CCA-BLT secure PKE scheme compared to the work of
Damgård et al. [8]. Both these constructions rely on projective almost-universal
hash-proof system (HPS) as a common building block, and we observe that on
a high level, our entropic post-challenge BLT security relies on the statistical
soundness property of the HPS. However, we choose to start with the construc-
tion of Damgård et al. [8] due to its simplicity.
Entropic Post-challenge IND-CCA-BLT PKE: Next, we show how
to upgrade the entropic restricted post-challenge IND-CCA-BLT security to
entropic post-challenge IND-CCA-BLT security. In the entropic notion, the
adversary can query arbitrary ciphertexts to the (tampered) decryption oracles,
as opposed to the entropic restricted notion, where the adversary can only query
well-formed (valid) ciphertexts to the oracle. The adversary also has access to the
normal (non-tampered) decryption oracle Dec(sk, ·) both in the pre- and post-
challenge phase as in the IND-CCA security game. The transformation follows
the classical paradigm of converting a CPA-secure PKE to a CCA-secure one by
appending to the ciphertext a zero knowledge argument proving the knowledge of
the plaintext. Similar transformation was shown in [8] for converting a restricted
IND-CCA-BLT secure PKE scheme to a full fledged IND-CCA-BLT secure PKE
scheme in the context of pre-challenge leakage and tampering. We observe that
the same transformation goes through in the context of post-challenge leakage
and tampering as well, and also when the PKE scheme is entropic.
Upgrading to Full Fledged (Non-entropic) Security: We then show how
to compile such an entropic post-challenge IND-CCA-BLT secure PKE scheme
to a full-fledged post-challenge IND-CCA-BLT secure PKE scheme. For this, we
28 S. Chakraborty and C. P. Rangan
resort to our split-state leakage and tampering restriction2 . On a high level, our
construction bears similarity with the construction of [16], although the PKE
scheme of [16] was only proven to be CPA secure against leakage attacks. We
appropriately modify their construction to prove our scheme to be CCA-secure
and resilient to joint leakage and tampering attacks. To make the construction
more modular, we first show how to construct post-challenge IND-CCA-BLT
secure key encapsulation mechanism (KEM) and later show how to compile it
to a full-fledged PKE scheme.
On a high level, to generate an encapsulated symmetric key, we generate a
key pair (vk, sk) of a strong one-time signature (OTS) scheme. We then use
two instances of the entropic scheme to encrypt two random strings x1 and
x2 independently, with the verification key vk as the label/tag to generate two
ciphertexts c1 and c2 respectively. The ciphertext c = (c1 , c2 ) is then signed using
the OTS scheme to generate a signature, say, σ. Finally, we apply a seedless
2-source extractor to both x1 and x2 to generate the encapsulated key. We then
output the final ciphertext c = (vk, c1 , c2 , σ). On a high level, the security of the
entropic scheme guarantees that both the strings x1 and x2 still retain enough
average min-entropy even after chosen-ciphertext leakage and tampering attacks
(even in the post-challenge phase). In addition, the split-state model ensures that
the strings are independent. At this point, we can use an average-case seedless
2-source extractor to extract a random encapsulation key from both the strings.
The trick of generating a key pair of an OTS and setting the verification key
vk as a tag/label while encrypting, ensures that, a tag cannot be re-used by
an adversary in a decryption or tampering query, hence preventing “mix-and-
match” attacks (In fact, to re-use that tag, the adversary essentially has to forge
a signature under vk).
Compiling to a Post-challenge IND-CCA-BLT PKE: Finally, we show
how to construct a IND-CCA-BLT secure PKE from a IND-CCA-BLT secure
KEM as above. One natural idea to achieve this is to use standard hybrid encryp-
tion technique, where a symmetric-key encryption (SKE) scheme is used to
encrypt the message using the derived encapsulation key. However, we point
out, that unlike in standard PKE or even in leakage-resilient PKE settings, this
transformation needs a little careful analysis in the context of tampering. This
is because the adversary can also ask decryption queries with respect to the
tampered keys, and the security of the challenge ciphertext should hold even
given these tampered decryption oracle responses. This is not directly guar-
anteed by standard hybrid encryption paradigm. However, we leverage on the
security guarantee of our KEM scheme and show that it is indeed possible to
argue the above security. In particular, our KEM scheme guarantees that the
average min-entropy of the challenge KEM key K ∗ is negligibly close to an uni-
form distribution over the KEM key space, even given many tampered keys
K = (K t ). So, in the hybrid, we can replace the key K ∗ with a uniform
1, · · · , K
random key. This implies that, with very high probability, K ∗ is independent
2
For our construction the secret key is split into only two parts/splits, which is the
optimal.
Public Key Encryption Resilient to Post-challenge Leakage 29
of the tampered key distribution, and hence any function of the tampered keys
(in particular decryption function). We can then rely on the (standard) CCA
security of the SKE to argue indistinguishability of the challenge messages.
Finally, combining all the above ideas together, we obtain the full construction
of a post-challenge IND-CCA-BLT secure PKE scheme, thus solving the open
problem posed by Faonio and Venturi [12] (Asiacrypt 2016).
Lastly, we note that, it is instructive to compare our approach of constructing
post-challenge leakage and tamper-resilient PKE construction with that of Liu
and Lysyanskaya [19]. We observe that the framework of [19] instantiated with a
non-malleable extractor, would already produce a scheme with security against
post-challenge tampering. However, their model is not comparable with ours
in the following sense. In particular, the framework of [19] considers securing
any (deterministic) cryptographic functionality against leakage and tampering
attacks, where the leakage and tampering functions apply only on the memory
of the device implementing the functionality, and not on its computation. This
is because the construction of [19] relies on a (computationally secure) leakage-
resilient non-malleable code, which allow only leakage and tampering on the
memory of the device. However, in our model, we allow the adversary to leak from
the memory and also allow to tamper with the internal computations (modeled
by giving the adversary access to tampered decryption oracles). In this sense,
our model is more general, as it also considers tampering with the computation.
However, a significant feature of the framework of [19] is that, it considers the
model of continual leakage and tampering (in split-state), whereas our model
considers bounded leakage and tampering (as in [8]) in split-state.
1.2 Organization
The rest of the paper is organized as follows. In Sect. 2, we provide the nec-
essary preliminaries required for our constructions. In Sect. 3, we give our def-
inition of entropic post-challenge IND-CCA-BLT secure PKE schemes and its
restricted notion. In Sect. 3.2, we show our construction of entropic restricted
post-challenge IND-CCA-BLT secure PKE and show the transformation from
the entropic restricted notion to the entropic notion in Sect. 3.3. In Sect. 4, we
present the security definition of post-challenge IND-CCA-BLT secure KEM
scheme and show a generic compiler from entropic post-challenge IND-CCA-
BLT secure PKE scheme to a post-challenge IND-CCA-BLT secure PKE scheme
in the standard model. Section 5 shows the generic transformation from such
a KEM scheme to a full fledged IND-CCA-BLT secure PKE scheme secure
against post-challenge leakage and tampering attacks. Finally Sect. 6 concludes
the paper.
2 Preliminaries
2.1 Notations
For n ∈ N, we write [n] = {1, 2, · · · , n}. If x is a string, we denote |x| as the
$
length of x. For a set X , we write x ←
− X to denote that element x is chosen
30 S. Chakraborty and C. P. Rangan
Lemma 1 [16]. For any δ > 0, if Ext2 : {0, 1}n × {0, 1}n → {0, 1}m is a (worst-
case) (k − log 1δ , )-2-source extractor, then Ext2 is an average-case (k, + 2δ)-
2-source extractor.
similar to the notion of simulation-sound extractable NIZKs [14] with the differ-
ence that the adversary has oracle access to simulated proofs only for true state-
ments, in contrast to any arbitrary statement as in simulation-sound extractable
NIZK argument system. In particular, we require the standard properties of
completeness, soundness and composable zero-knowledge. Additionally, we also
require the existence of another PPT extractor Ext which extracts a valid witness
from any proof produced by a malicious prover P ∗ , even if P ∗ has previously
seen some simulated proofs for true statements. We refer the reader to the full
version of our paper [6] for the formal definition of tSE-NIZK. For our purpose,
it is sufficient to rely on the (weaker) notion of one-time strong true simulation
extractability, where the adversary can query the simulation oracle SIMtk (.)
only once. Dodis et al. [9] showed how to generically construct tSE-NIZK argu-
ment systems supporting labels starting from any (labeled) CCA-secure PKE
scheme and a (standard) NIZK argument system.
chooses a function Ti ∈ TSK and gets access to the (tampered) decryption ora-
i , ·), where sk
cle Dec(sk i = Ti (sk). The adversary may ask polynomially many
decryption queries with respect to the tampered secret key sk i . In other words,
the adversary gets access to information through decryption oracle executed on
keys related to the original secret key, where the relations are induced by the
tampering functions. If the encryption scheme supports labels, i.e., it is a labeled
encryption scheme, the adversary gets access to the (tampered) decryption ora-
i , ·, ·), where the third coordinate is a placeholder for labels. Also,
cle Dec(sk
the adversary gets access to the (tampered) decryption oracle both in the pre-
and post-challenge phases. Another (obvious) restriction that is imposed on the
tampering functions is that: In the post-challenge phase, when the adversary
gets access to the (tampered) decryption oracles with respect to the challenge
ciphertext c∗ , it should be the case that Ti (sk) = sk, i.e., the post-challenge tam-
pering functions Ti should not be identity functions with respect to the challenge
ciphertext3 .
3
When Ti (sk) = sk, and the adversary gets access to the tampering oracle with
respect to c∗ , it is emulating the scenario when it gets decryption oracle access with
respect to sk on c∗ , which is anyway disallowed in the IND-CCA-2 security game.
Public Key Encryption Resilient to Post-challenge Leakage 33
Note that all these queries can be made arbitrarily and adaptively in nature.
We denote the message m chosen at the onset of this game as M rl to empha-
size that it is used in the real game. Let the sets Qpre and Qpost contain
tpre
the tuples of the form (m i1 , (ci1 , Li1 )), · · · , (m
iq(κ) , (ciq(κ) , Liq(κ) )) i=1 and
tpost
j1 , (cj1 , Lj1 )), · · · , (m
(m jq(κ) , (ciq (κ) , Liq (κ) )) respectively, for some poly-
j=1
nomials q(κ) and q (κ). Let Lpre and Lpost be the random variables correspond-
ing to the pre- and post-challenge leakages. We define the view of the adversary
A in the real game as ViewrlE-BLT,A (κ) = (rand, Lpre , Qpre , c∗ , Lpost , Qpost ), where
rand denotes the random coins used by the adversary in the game. Finally, we
denote by (M rl , ViewrlE-BLT,A ) the joint distribution of the message M rl and A’s
view in a real game with M rl .
The “simulated” game: In the simulated game, we replace the challenger
from above by a simulator Simu that interacts with A in any way that it sees fit.
4
Recall when we write Dec(sk θ , ·, ·), the second coordinate is the placeholder for
ciphertexts input by the adversary; whereas the third coordinate is the placeholder
for labels.
34 S. Chakraborty and C. P. Rangan
Simu gets a uniformly chosen message M sm as input and it has to simulate the
interaction with A conditioned on M sm . We denote the view of the adversary
in the simulated game by Viewsm sm
Simu,A (κ) = (rand , Lpre , Qpre , c , Lpost , Qpost ).
sm sm sm sm sm
Now, we define what it means for the encryption scheme ER-BLT to be entropic
restricted post-challenge (bounded) leakage and tamper-resilient.
∞ (M sm | Viewsm
H Simu,A (κ)) ≥ k − λpost − F(tpost ).
where F(tpost ) denotes the entropy loss due to post-challenge tampering queries,
and the tampering functions come from the class TSK .5
Intuitively, even after the adversary sees the encryption of the message, pre-
and post-challenge leakages and the output of the (tampered) decryption oracle
both in the pre- and post-challenge phase, the message M sm still retains its initial
entropy, except for the entropy loss due to post-challenge leakage and tampering.
public key). This restricts the power of the adversary to submit only “well-
formed ” ciphertexts to the tampering oracle. In particular, in the ith tampering
query the adversary chooses a function Ti ∈ TSK and gets access to a (modi-
fied) decryption oracle ER-BLT.Dec∗ (sk i , ·, ·), where sk
i = Ti (sk). This oracle
answers polynomially many queries of the following form: Upon input a pair
(m, r) ∈ M × R, (where M and R are the message space and randomness
space of the PKE respectively), compute c ← ER-BLT.Enc(pk, m; r) and output
a plaintext m = ER-BLT.Dec(sk i , c) under the current tampered key.
The real and simulated game for the above entropic restricted post-challenge
IND-CCA-BLT game, apart from the above restrictions, is identical to the real
and simulated games of the entropic post-challenge IND-CCA-BLT secure PKE
as defined in Definition 3. In particular, using the same notations from Defini-
tion 3, we denote the view of the adversary in the entropic restricted game as
ViewrlER-BLT,A (κ) = (rand, Lpre , Qpre , c∗ , Lpost , Qpost ), where Qpre and Qpost contain
answers to the (tampered) decryption oracle queries as described above with
respect to the tampered secret keys.
λpre + λpost ≤ − 2 − tpre − tpost log p − ω(log κ) and (tpre + tpost ) ≤ − 3.
36 S. Chakraborty and C. P. Rangan
Proof. Before proceeding with the proof of the above theorem, we prove a lemma
(Lemma 2) that essentially shows that the BHHO cryptosystem is entropic
leakage-resilient with respect to pre- and post-challenge leakage,
i.e., it satisfies
the notion of entropic restricted post-challenge IND-CCA- k, (λpre , λpost ), (0, 0) -
BLT security (the adversary has no access to the tampering oracle), for appro-
priate choice of parameters. We then prove the above theorem by using Lemma 2
and showing a leakage to tamper reduction to take care of pre- and post-challenge
tampering queries.
Lemma 2. The BHHO cryptosystem described above is entropic restricted post-
challenge IND-CCA- k, (λpre , λpost ), (0, 0) -BLT secure, where
λpre + λpost ≤ − 2 log p − ω(log κ)
Proof Sketch. We now give an intuitive proof sketch of the above theorem. Infor-
mally, the zero-knowledge argument enforces the adversary to submit to the
(tampered) decryption oracle only valid ciphertexts, for which he knows the
corresponding plaintext (and the randomness used to encrypt it). The plaintext-
randomness pair (m, r) (which acts as a witness) can then be extracted using the
extraction trapdoor of the tSE-NIZK argument system, thus allowing to reduce
entropic IND-CCA BLT security to entropic restricted IND-CCA BLT security.
Since the extraction trapdoor is never used in the real encryption scheme, the
adversary neither gets any leakage from it, nor gets to tamper with it. This
essentially makes the (tampered) decryption oracle useless and the adversary
learns no additional information from the decryption oracle access. The proof
also relies on the fact that the CRS is untamperable, a notion that is used in all
the previous works [8,12]. This can be achieved by (say) hard-coding the CRS
in the encryption algorithm. The detailed proof of this theorem can be found in
the full version [6] of our paper.
38 S. Chakraborty and C. P. Rangan
CONTENTS
Page
I. A Voice in the Wilderness 1
II. The Black Hole of Glenranald 32
III. "To the Vile Dust" 70
IV. A Bushranger at Bay 98
V. The Taking of Stingaree 121
VI. The Honor of the Road 144
VII. The Purification of Mulfera 168
VIII. A Duel in the Desert 190
IX. The Villain-Worshipper 215
X. The Moth and the Star 252
ILLUSTRATIONS
A CONSCIENTIOUS ASS
A BOY ABOUT TOWN
HIS PEOPLE
A GRIM SAMARITAN
THE GLASS EYE
AN AWAKENING
BLOOD-GUILTY
POINTS OF VIEW
MR. EUGENE THRUSH
SECOND THOUGHTS
ON PAROLE
HUNTING WITH THE HOUNDS
BOY AND GIRL
BEFORE THE STORM
A LIKELY STORY
MALINGERING
ON THE TRACK OF THE TRUTH
A THIRD CASE
THE FOURTH CASE
WHAT THE THAMES GAVE UP
AFTER THE FAIR
THE SECRET OF THE CAMERA
A THIEF IN THE NIGHT
FURTHER ADVENTURES OF A. J. RAFFLES
CONTENTS
Page
Out of Paradise 1
The Chest of Silver 32
The Rest Cure 58
The Criminologists' Club 88
The Field of Philippi 122
A Bad Night 156
A Trap to Catch a Cracksman 184
The Spoils of Sacrilege 216
The Raffles Relics 247
The Last Word 278
ILLUSTRATIONS
I think she must have seen us, even in the dim light Frontispiece
Facing Page
Raffles in the strong-room 54
It was the fire-eating and prison-inspecting colonel
76
himself. He was ready for me, a revolver in his hand
Raffles was as excited as any of us now; he
106
outstripped us all
He kept us laughing in his study until the chapel bells
152
rang him out
The ragged trousers stripped from an evening pair 176
Down went the trap-door with a bang 232
No one can make out what this little thick velvet bag's
260
for
CONTENTS
Page
I. The Belle of Toorak 1
II. Injury 14
III. Insult 28
IV. Bethune of the Hall 39
V. A Red Herring 58
VI. Below Zero 67
VII. A Cavalier 84
VIII. The Kind of Life 97
IX. Pax in Bello 120
X. The Truth by Inches 134
XI. Bethune v. Bethune 147
XII. An Escapade 166
XIII. Blind Man's Block 180
XIV. His Own Coin 196
XV. The Fact of the Matter 206
WITCHING HILL
By E. W. Hornung
CONTENTS
LIST OF ILLUSTRATIONS
CONTENTS
A Nucleus of Fortune 1
Sundown 11
After Four Years 20
How Dick Came Home 28
The First Evening at Graysbrooke 41
Sisyphus 53
South Kensington 64
The Admirable Miles 72
A Dancing Lesson and its Consequences 86
An Old Friend and an Old Memory 98
Dressing, Dancing, Looking on 109
"To-Morrow, and To-Morrow, and To-Morrow" 123
In Bushey Park 132
Quits 152
The Morning After 163
Military Manœuvres 174
"Miles's Beggars" 185
Alice Speaks for Herself 196
Conterminous Courses 206
Strange Humility 216
An Altered Man 227
Extremities 234
The Effect of a Photograph 244
The Effect of a Song 256
Melmerbridge Church 271
At Bay 286
The Fatal Tress 296
The Effort 307
Elizabeth Ryan 313
Sweet Revenge 325
The Charity of Silence 333
Suspense: Reaction 343
How Dick Said Good-Bye 353
PECCAVI
By E. W. Hornung
CONTENTS
Chapter Page
I. Dust to Dust 1
II. The Chief Mourner 11
III. A Confession 18
IV. Midsummer Night 29
V. The Man Alone 45
VI. Fire 51
VII. The Sinner's Prayer 66
VIII. The Lord of the Manor 77
IX. A Duel Begins 89
X. The Letter of the Law 100
XI. Labour of Hercules 115
XII. A Fresh Discovery 125
XIII. Devices of a Castaway 131
XIV. The Last Resort 137
XV. His Own Lawyer 150
XVI. End of the Duel 162
XVII. Three Weeks and a Night 186
XVIII. The Night's Work 193
XIX. The First Winter 209
XX. The Way of Peace 230
XXI. At the Flint House 249
XXII. A Little Child 262
XXIII. Design and Accident 275
XXIV. Glamour and Rue 291
XXV. Signs of Change 306
XXVI. A Very Few Words 316
XXVII. An Escape 323
XXVIII. The Turning Tide 335
XXIX. A Haven of Hearts 348
XXX. The Woman's Hour 362
XXXI. Advent Eve 378
XXXII. The Second Time 390
XXXIII. Sanctuary 397
CONTENTS
CHAPTER PAGE
I. A Small World 1
II. Second Sight 16
III. In the Train 29
IV. Down the River 42
V. An Untimely Visitor 64
VI. Voluntary Service 83
VII. After Michelangelo 98
VIII. Finger-Prints 117
IX. Fair Warning 134
X. The Week of Their Lives 146
XI. In Country and In Town 156
XII. The Thousandth Man 169
XIII. Quid Pro Quo 181
XIV. Faith Unfaithful 205
XV. The Person Unknown 214
TINY LUTTRELL
By Ernest W. Hornung
CONTENTS
CHAPTER PAGE
I. The Coming of Tiny, 1
II. Swift of Wallandoon, 21
III. The Tail of the Season, 44
IV. Ruth and Christina, 63
V. Essingham Rectory, 84
VI. A Matter of Ancient History, 102
VII. The Shadow of the Hall, 116
VIII. Countess Dromard at Home, 133
IX. Mother and Son, 148
X. A Threatening Dawn, 162
XI. In the Ladies' Tent, 176
XII. Ordeal by Battle, 193
XIII. Her Hour of Triumph, 213
XIV. A Cycle of Moods, 233
XV. The Invisible Ideal, 248
XVI. Foreign Soil, 263
XVII. The High Seas, 286
XVIII. The Third Time of Asking, 306
XIX. Counsel's Opinion, 317
XX. In Honor Bound, 327
XXI. A Deaf Ear, 339
XXII. Summum Bonum, 348
MY LORD DUKE
By E. W. Hornung
CONTENTS
I. The Head of the Family 1
II. "Happy Jack" 16
III. A Chance Lost 31
IV. Not in the Programme 44
V. With the Elect 63
VI. A New Leaf 77
VII. The Duke's Progress 90
VIII. The Old Adam 105
IX. An Anonymous Letter 122
X. "Dead Nuts" 137
XI. The Night of the Twentieth 151
XII. The Wrong Man 163
XIII. The Interregnum 180
XIV. Jack and his Master 189
XV. End of the Interregnum 199
XVI. "Love the Gift" 215
XVII. An Anti-Toxine 223
XVIII. Heckling a Minister 233
XIX. The Cat and the Mouse 244
XX. "Love the Debt" 257
XXI. The Bar Sinister 266
XXII. De Mortuis 282
CONTENTS
DENIS DENT
By Ernest W. Hornung
CONTENTS
Chapter Page
I. The Second Officer 1
II. Sauve Qui Peut 10
III. The Castaways 18
IV. Lost and Found 30
V. A Touch of Fever 37
VI. New Conditions 48
VII. Denis and Nan 57
VIII. Cold Water 70
IX. The Canvas City 79
X. Thieves in the Night 90
XI. Strange Bedfellows 102
XII. El Dorado 114
XIII. The Enemy's Camp 122
XIV. The First Claim 133
XV. A Pious Fraud 146
XVI. A Windfall 158
XVII. Hate and Money 168
XVIII. Rotten Gully 178
XIX. New Blood 187
XX. The Jeweler's Shop 196
XXI. The Courier of Death 211
XXII. Atra Cura 220
XXIII. Broken Off 231
XXIV. Death's Door 243
XXV. Beat of Drum 251
XXVI. Homeward Bound 265
XXVII. The Great Gulf 277
XXVIII. News of Battle 289
XXIX. Guy Fawkes Day 299
XXX. The Sandbag Battery 310
XXXI. Time's Whirligig 319
CONTENTS
CHAPTER I
PAGE
The Little Musician 1
CHAPTER II
A Friend Indeed 13
CHAPTER III
"Hard Times" 25
CHAPTER IV
The Treasure in the Store 41
CHAPTER V
Masterless Men 55
CHAPTER VI
£500 71
CHAPTER VII
The Ringer of the Shed 83
CHAPTER VIII
"Three Shadows" 102
CHAPTER IX
No Hope for Him 120
CHAPTER X
Missing 138
CHAPTER XI
Lost in the Bush 152
CHAPTER XII
Fallen Among Thieves 162
CHAPTER XIII
A Smoking Concert 179
CHAPTER XIV
The Raid on the Station 194
CHAPTER XV
The Night Attack 210
CHAPTER XVI
In the Midst of Death 232
YOUNG BLOOD
By E. W. Hornung
CONTENTS
PAGE
CHAPTER I.
The Old Home 1
CHAPTER II.
The Breaking of the News 11
CHAPTER III.
The Sin of the Father 20
CHAPTER IV.
The New Home 32
CHAPTER V.
A Wet Blanket 40
CHAPTER VI.
The Game of Bluff 57
CHAPTER VII.
On Richmond Hill 71
CHAPTER VIII.
A Millionaire in the Making 85
CHAPTER IX.
The City of London 95
CHAPTER X.
A First Offence 111
CHAPTER XI.
Beggar and Chooser 122
CHAPTER XII.
The Champion of the Gods 135
CHAPTER XIII.
The Day of Battle 150
CHAPTER XIV.
A Change of Luck 165
CHAPTER XV.
It Never Rains but it Pours 175
CHAPTER XVI.
A Dame's School 183
CHAPTER XVII.
At Fault 195
CHAPTER XVIII.
Mr. Scrafton 203
CHAPTER XIX.
Assault and Battery 214
CHAPTER XX.
Biding his Time 226
CHAPTER XXI.
Hand to Hand 234
CHAPTER XXII.
Man to Man 247
CHAPTER XXIII.
The End of the Beginning 259
CHAPTER XXIV.
Young Ink 276
CHAPTER XXV.
Scrafton's Story 287
CHAPTER XXVI.
A Masterstroke 304
CHAPTER XXVII.
Restitution 315
CHAPTER XXVIII.
A Tale Apart 326
PAGE
Kenyon's Innings 1
A Literary Coincidence 40
"Author! Author!" 71
The Widow of Piper's Point 87
After the Fact 104
The Voice of Gunbar 151
The Magic Cigar 168
The Governess at Greenbush 186
A Farewell Performance 234
A Spin of the Coin 244
The Star of the Grasmere 256
FATHERS OF MEN
CONTENTS
CHAPTER PAGE
I. Behind the Scenes 1
II. Change and Chance 11
III. Very Raw Material 21
IV. Settling In 33
V. Nicknames 43
VI. Boy to Boy 53
VII. Reassurance 62
VIII. Likes and Dislikes 75
IX. Coram Populo 90
X. Elegiacs 105
XI. A Merry Christmas 123
XII. The New Year 133
XIII. The Haunted House 146
XIV. Summer-Term 174
XVI. Similia Similibus 186
XVII. The Fun of the Fair 196
XVIII. Dark Horses 212
XIX. Fame and Fortune 225
XX. The Eve of Office 240
XXI. Out of Form 250
XXII. The Old Boys' Match 259
XXIII. Interlude in a Study 266
XXIV. The Second Morning's Play 277
XXV. Interlude in the Wood 290
XXVI. Close of Play 304
XXVII. The Extreme Penalty 317
XXVIII. Chips and Jan 336
XXX. His Last Fling 349
XXXI. Vale 360
CONSECRATION
LORD'S LEAVE
LAST POST
THE OLD BOYS
RUDDDY YOUNG GINGER
THE BALLAD OF ENSIGN JOY
BOND AND FREE
SHELL-SHOCK IN ARRAS
THE BIG THING
FORERUNNERS *
UPPINGHAM SONG
WOODEN CROSSES
CONTENTS
ebookbell.com