A Key-private Cryptosystem from the Quadratic Residuosity
Marc Joye
Technicolor, 175 S San Antonio Rd, Los Altos, CA 94022, U.S.A.
Keywords:
Public-Key Encryption, Key Privacy, Quadratic Residuosity.
Abstract:
This paper presents a key-private public-key cryptosystem. More specifically, in addition to confidentiality,
it provides privacy. Informally, ciphertexts yield no information whatsoever about its recipient (beyond what
is publicly known). The presented cryptosystem also features a very fast key generation: the key generation
boils down to a mere squaring modulo an RSA modulus. Further, it comes with strong security guarantees: it
is proved to be semantically secure and key-private under the standard quadratic residuosity assumption.
1 INTRODUCTION
In numerous scenarios, the recipient’s identity in a
transmission needs to be kept private. This allows
users to maintain some privacy. Protecting commu-
nication content may be not enough, as already ob-
served in a couple of papers (e.g., (Barth et al., 2006;
Bellare et al., 2001; Kiayias et al., 2007)). For exam-
ple, by analyzing the traffic between an antenna and
a mobile device, one can recover some information
about [at least] user’s position and some details about
the use of her mobile device. This information leaks
easily during all day: it is a common habit, indeed, to
use a mobile phone every day and to keep it (almost)
always switched on.
Key privacy in public-key encryption assumes
a “homogeneous” environment. Indeed, if users
make use of different cryptosystems or of the same
cryptosystem but with keys of different lengths,
anonymity is likely to be lost. The notion of
anonymity is therefore is restricted to users sharing
the same cryptosystem (with different keys) and com-
mon parameters. This implicitly defines a group of
users.
Kiayias et al. introduce and model in (Ki-
ayias et al., 2007) the concept of group encryption.
This is the analogue for encryption of group signa-
tures (Chaum and van Heyst, 1991). Group encryp-
tion allows one to conceal the identity of the recip-
ient of a given ciphertext among a set of legitimate
receivers. However, in case of misuse, some author-
ity (the group manager) is capable of recovering the
recipient’s identity. This paper mostly deals with full
anonymity: anonymity cannot be revoked.
Furthermore, in addition to security and privacy
properties, group encryption offers verifiability: a
sender can convince a verifier that the formed cipher-
text can be decrypted by a group member. In this
paper, we relax the requirements for group encryp-
tion. In the particular context of media broadcasting
or wireless communications, we face a different situa-
tion where the sender (the broadcaster or the wireless
emitter) can be trusted. This relaxation is justified by
the fact that, in practical uses of the infrastructure, the
sender has no interest in cheating because of business
and reputation aspects. Moreover, it is very unlikely
that an attacker can impersonate the sender, due to the
particular material infrastructure needed (expensive,
powerful, ...). Such an attacker should, indeed, mute
the licit signals and substitute them with illicit ones,
keeping all existing communications alive and faking
the attacked ones.
As aforementioned, key-private encryption is a
form of encryption which allows one to conceal
the identity of the ciphertext’s recipient. Known
constructions for key-private cryptosystems involve
somewhat costly key generations. We present in this
paper a key-private cryptosystem enjoying a fast key
generation. In our case, the key generation boils down
to a mere modular squaring. Furthermore, to our best
knowledge, the presented cryptosystem is the sole
key-private construction that is provably secure under
the standard quadratic residuosity assumption, in the
standard model.
Outline of the Paper: The rest of this paper is or-
ganized as follows. In the next section, we review
some background on public-key encryption. We then
398
Joye M..
A Key-private Cryptosystem from the Quadratic Residuosity.
DOI: 10.5220/0005569703980404
In Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT-2015), pages 398-404
ISBN: 978-989-758-117-5
Copyright
c
2015 SCITEPRESS (Science and Technology Publications, Lda.)