On the Hardness of Proving CCA-Security of Signed ElGamal

David Bernhard, Marc Fischlin, Bogdan Warinschi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)
371 Downloads (Pure)

Abstract

The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr proof of knowledge. While this scheme should be intuitively secure against chosen-ciphertext attacks in the random oracle model, its security has not yet been proven nor disproven so far, without relying on further non-standard assumptions like the generic group model. Currently, the best known positive result is that Signed ElGamal is non-malleable under chosen-plaintext attacks. In this paper we provide evidence that proving Signed ElGamal to be CCA secure in the random oracle model is hard. That is, building on previous work of Shoup and Gennaro (Eurocrypt'98), Seurin and Treger (CT-RSA 2013), and Bernhard et al. (PKC 2015), we exclude a large class of potential reductions that could be used to establish CCA security of the scheme.
Original languageEnglish
Title of host publicationPublic-Key Cryptography – PKC 2016
Subtitle of host publication19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
EditorsChen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang
PublisherSpringer
Pages47-69
Number of pages23
ISBN (Electronic)9783662493847
ISBN (Print)9783662493830
DOIs
Publication statusPublished - 18 Feb 2016
EventPKC 2016 - , United Kingdom
Duration: 6 Mar 2016 → …

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9614
ISSN (Print)0302-9743

Conference

ConferencePKC 2016
Country/TerritoryUnited Kingdom
Period6/03/16 → …

Fingerprint

Dive into the research topics of 'On the Hardness of Proving CCA-Security of Signed ElGamal'. Together they form a unique fingerprint.

Cite this