1. Generic Semantic Security against a Kleptographic Adversary 2017 CCS Kleptography
    Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou
    [View PDF on acmccs.github.io]
    [Show BibTex Citation]

    @inproceedings{10.1145/3133956.3133993,
    author = {Russell, Alexander and Tang, Qiang and Yung, Moti and Zhou, Hong-Sheng},
    title = {Generic Semantic Security against a Kleptographic Adversary},
    year = {2017},
    isbn = {9781450349468},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3133956.3133993},
    doi = {10.1145/3133956.3133993},
    booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
    pages = {907–922},
    numpages = {16},
    keywords = {semantic security, kleptography, pke},
    location = {Dallas, Texas, USA},
    series = {CCS ’17}
    }

Notable recent security incidents have generated intense interest in adversaries which attempt to subvert—perhaps covertly—crypto-graphic algorithms. In this paper we develop (IND-CPA) Semantically Secure encryption in this challenging setting. This fundamental encryption primitive has been previously studied in the “kleptographic setting,” though existing results must relax the model by introducing trusted components or otherwise constraining the subversion power of the adversary: designing a Public Key System that is kletographically semantically secure (with minimal trust) has remained elusive to date. In this work, we finally achieve such systems, even when all relevant cryptographic algorithms are subject to adversarial (kleptographic) subversion. To this end we exploit novel inter-component randomized cryptographic checking techniques (with an offline checking component), combined with common and simple software engineering modular programming techniques (applied to the system’s black box specification level). Moreover, our methodology yields a strong generic technique for the preservation of any semantically secure cryptosystem when incorporated into the strong kleptographic adversary setting.

  1.