Anamorphic Cryptography

  • Living reference work entry
  • First Online:
Encyclopedia of Cryptography, Security and Privacy
  • 26 Accesses

Definitions

Anamorphic cryptography seeks to create private communication channels within existing cryptographic schemes, with the goal of circumventing censorship imposed by a dictator (an adversary which possesses the keys of the receiver, and may also dictate the messages to send).

Background

In cryptosystems, there exist two implicit assumptions: one is that the secrecy of the receiver’s private key is maintained (referred to as the receiver-privacy assumption), and the other is that the sender retains the liberty to select the message to transmit (referred to as the sender-freedom assumption). However, in practical scenarios, these foundational assumptions can be entirely undermined by an authoritative entity known as the “dictator” possessing the capability to access any individual’s secret key and censor message content.

To achieve both private and unrestricted communication in this context, Persiano et al. (2022) introduced a novel concept called “anamorphic encryption” (AME)...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Banfi F, Gegier K, Hirt M, Maurer U (2023) Anamorphic encryption, revisited. Cryptology ePrint Archive, Paper 2023/249 (also in Eurocrypt 2024). https://eprint.iacr.org/2023/249

  • Chen R, Huang X, Yung M (2020) Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption. In: Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, 7–11 Dec, 2020. Proceedings, Part II, vol 26. Springer, pp 98–128

    Google Scholar 

  • Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp 197–206

    Google Scholar 

  • Kutyłowski M, Persiano G, Phan DH, Yung M, Zawada M (2023) Anamorphic signatures: Secrecy from a dictator who only permits authentication! In: Annual International Cryptology Conference. Springer, pp 759–790

    Google Scholar 

  • Kutylowski M, Persiano G, Phan DH, Yung M, Zawada M (2023) The self-anti-censorship nature of encryption: On the prevalence of anamorphic cryptography. Proc Privacy Enhancing Technol 2023(4):170–183

    Article  Google Scholar 

  • Naor M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the twenty-second annual ACM symposium on Theory of computing, pp 427–437

    Google Scholar 

  • Persiano G, Phan DH, Yung M (2022) Anamorphic encryption: private communication against a dictator. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 34–63

    Google Scholar 

  • Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):1–40

    Article  MathSciNet  Google Scholar 

  • Von Ahn L, Hopper NJ (2004) Public-key steganography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 323–341

    Google Scholar 

  • Wang Y, Chen R, Huang X, Yung M (2023) Sender-anamorphic encryption reformulated: Achieving robust and generic constructions. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 135–167

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Springer Science+Business Media LLC

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Wang, Y., Chen, R., Huang, X., Yung, M. (2024). Anamorphic Cryptography. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1832-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27739-9_1832-1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27739-9

  • Online ISBN: 978-3-642-27739-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Navigation