Published in

Springer, Journal of Cryptology, 2(31), p. 307-350, 2017

DOI: 10.1007/s00145-017-9258-8

Springer Verlag, Lecture Notes in Computer Science, p. 480-497

DOI: 10.1007/978-3-642-11799-2_28

Links

Tools

Export citation

Search in Google Scholar

Robust Encryption

Journal article published in 2010 by Michel Abdalla ORCID, Mihir Bellare, Gregory Neven
This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Green circle
Preprint: archiving allowed
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption. We show that natural anonymity-preserving ways to achieve it, such as adding recipient identification information before encrypting, fail. We provide transforms that do achieve it, efficiently and provably. We assess the robustness of specific encryption schemes in the literature, providing simple patches for some that lack the property. We present various applications. Our work enables safer and simpler use of encryption.