dc.contributor.author | Godi, Murali | |
dc.contributor.author | Viswanathan, Roopa; Adviser | |
dc.contributor.author | Novillo, Jorge; Reviewer | |
dc.contributor.author | Chiang, Chen-Fu; Reviewer | |
dc.date.accessioned | 2017-02-13T18:01:05Z | |
dc.date.available | 2017-02-13T18:01:05Z | |
dc.date.issued | 2016-12-15 | |
dc.identifier.uri | http://hdl.handle.net/1951/68898 | |
dc.description | A Thesis submitted to the Graduate Faculty of the State University of New York Polytechnic Institute in Partial Fulfillment of the Requirements for the Degree of Master of Science | en_US |
dc.description.abstract | In this paper, we consider a situation where a sender transmits a ciphertext to a receiver using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintext, without having to request the receiver’s help in decrypting the ciphertext, and without having to store a set of plaintext/ciphertext pairs for every receiver the sender interacts with. This problem, known as public key encryption with sender recovery has intuitive solutions based on KEM/DEM schemes.
We propose a KEM/DEM-based solution that is CCA-secure, and only requires the receiver to be equipped with a public/secret key pair (the sender needs only a symmetric recovery key), and has much simplified proofs compared to prior work in this area. We prove our protocols secure in the single receiver and multi-receiver setting. To achieve our goals, we use an analysis technique called plaintext randomization that results in greatly simplified and intuitive proofs for protocols that use a PKE internally as a component and compose the PKE with other primitives. We instantiate our protocol for public key encryption with sender recovery with the well-known KEM/DEM scheme due to Cramer and Shoup. | en_US |
dc.subject | ciphertext | en_US |
dc.subject | public key encryption | en_US |
dc.subject | plaintext randomization | en_US |
dc.title | New Techniques for Public Key Encryption with Sender Recovery | en_US |
dc.type | Thesis | en_US |