• DocumentCode
    1963710
  • Title

    Bit Encryption Is Complete

  • Author

    Myers, Steven ; Shelat, Abhi

  • Author_Institution
    Sch. of Inf., Indiana Univ., Bloomington, IN, USA
  • fYear
    2009
  • fDate
    25-27 Oct. 2009
  • Firstpage
    607
  • Lastpage
    616
  • Abstract
    Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, however, under a CCA2 attack. In fact, since the notion of CCA2 security was introduced by Rackoff and Simon [21], it has been an open question to determine whether single bit CCA2 secure encryption implies the existence of many-bit CCA2 security. We positively resolve this long-standing question and establish that bit encryption is complete for CPA, CCA1, and CCA2 notions. Our construction is black-box, and thus requires novel techniques to avoid known impossibility results concerning trapdoor predicates [10]. To the best of our knowledge, our work is also the first example of a non-shielding reduction (introduced in [9]) in the standard (i.e., not random-oracle) model.
  • Keywords
    public key cryptography; CCA1 attack; CCA2 secure encryption; CPA attack; bit encryption; many-bit CCA2 security; many-bit encryption scheme; secure bit encryption scheme; Computer science; Decoding; Informatics; Inspection; Public key; Public key cryptography; Security; Chosen-ciphertext secure public key encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 2009. FOCS '09. 50th Annual IEEE Symposium on
  • Conference_Location
    Atlanta, GA
  • ISSN
    0272-5428
  • Print_ISBN
    978-1-4244-5116-6
  • Type

    conf

  • DOI
    10.1109/FOCS.2009.65
  • Filename
    5438592