Definitions
Anamorphic cryptography seeks to create private communication channels within existing cryptographic schemes, with the goal of circumventing censorship imposed by a dictator (an adversary which possesses the keys of the receiver, and may also dictate the messages to send).
Background
In cryptosystems, there exist two implicit assumptions: one is that the secrecy of the receiver’s private key is maintained (referred to as the receiver-privacy assumption), and the other is that the sender retains the liberty to select the message to transmit (referred to as the sender-freedom assumption). However, in practical scenarios, these foundational assumptions can be entirely undermined by an authoritative entity known as the “dictator” possessing the capability to access any individual’s secret key and censor message content.
To achieve both private and unrestricted communication in this context, Persiano et al. (2022) introduced a novel concept called “anamorphic encryption” (AME)...
References
Banfi F, Gegier K, Hirt M, Maurer U (2023) Anamorphic encryption, revisited. Cryptology ePrint Archive, Paper 2023/249 (also in Eurocrypt 2024). https://eprint.iacr.org/2023/249
Chen R, Huang X, Yung M (2020) Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption. In: Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, 7–11 Dec, 2020. Proceedings, Part II, vol 26. Springer, pp 98–128
Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp 197–206
Kutyłowski M, Persiano G, Phan DH, Yung M, Zawada M (2023) Anamorphic signatures: Secrecy from a dictator who only permits authentication! In: Annual International Cryptology Conference. Springer, pp 759–790
Kutylowski M, Persiano G, Phan DH, Yung M, Zawada M (2023) The self-anti-censorship nature of encryption: On the prevalence of anamorphic cryptography. Proc Privacy Enhancing Technol 2023(4):170–183
Naor M, Yung M (1990) Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the twenty-second annual ACM symposium on Theory of computing, pp 427–437
Persiano G, Phan DH, Yung M (2022) Anamorphic encryption: private communication against a dictator. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 34–63
Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):1–40
Von Ahn L, Hopper NJ (2004) Public-key steganography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 323–341
Wang Y, Chen R, Huang X, Yung M (2023) Sender-anamorphic encryption reformulated: Achieving robust and generic constructions. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 135–167
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 Springer Science+Business Media LLC
About this entry
Cite this entry
Wang, Y., Chen, R., Huang, X., Yung, M. (2024). Anamorphic Cryptography. In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27739-9_1832-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27739-9_1832-1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27739-9
Online ISBN: 978-3-642-27739-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering