This thesis presents tight security results in independent cryptographic
schemes public-key encryption (PKE) and identity-based signature (IBS). The
security of PKE schemes in multi-user settings is aimed at capturing real-world
scenarios in which an ...
This thesis presents tight security results in independent cryptographic
schemes public-key encryption (PKE) and identity-based signature (IBS). The
security of PKE schemes in multi-user settings is aimed at capturing real-world
scenarios in which an adversary could attack multiple users and multiple ciphertexts
of its choice. However, the fact that a real-world adversary can also
mount key-exposure attacks requires us to consider a more realistic notion of
security in multi-user settings. An IBS scheme can be generically constructed
from an ordinary signature scheme. But it was unclear that a generic construction
leads to a tightly secure IBS scheme, no matter what tightly secure
signature scheme be used as a building block.
The summary of tight security results of this thesis is presented as follows:
• This thesis defines the security notion of PKE in a multi-user setting with
corruptions, where an adversary is able to issue corruption (i.e., private key)
queries. Then, this thesis proposes the first practical and tightly secure PKE
scheme in the multi-user setting with corruptions.
• This thesis shows that the recent work by Seo, Abdalla, Lee, and Park
(Information Sciences, July 2019) has a flaw in the security analysis of
CCA conversion methods and presents revised security proofs.
• This thesis demonstrates that the generic construction of IBS can achieve
tightness if the underlying signature scheme is tightly secure in the multiuser
setting with corruption. In addition, this thesis extends the tightness
result of IBS to the multi-instance setting, where an adversary can corrupt
multiple key generation centers and obtain related master secret keys.