CCA1.5
Adaptive Chosen Ciphertext Decryption/Verification Attack
Introduced In
- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture
Angsuman Das, Sabyasachi Dutta, Avishek Adhikari (2013)
Relations
Implied By
Implies
Overview
Adaptive Chosen Ciphertext Decryption/Verification Attack (CCA1.5) security, introduced by Das, Dutta, and Adhikari at ProvSec 2013, is an indistinguishability notion that interpolates between CCA1 and CCA2 by giving the adversary a full decryption oracle during the first (pre-challenge) query phase and a weaker ciphertext verification oracle during the second (post-challenge) query phase. The verification oracle answers whether a queried ciphertext is valid - i.e. decrypts to a non-
The motivation is that this two-phase model more faithfully reflects many practical adversaries. After a temporary “lunchtime” window of full decryption access (as in CCA1), an attacker often retains only indirect feedback from a remote decryption device - for example, the network-level accept/reject signal exploited by Bleichenbacher’s attack on RSA-PKCS#1 and by the Hall-Goldberg-Schneier “reaction attack” on the McEliece and Ajtai-Dwork cryptosystems. CCA1.5 captures exactly this setting: an adversary who once had full decryption access and now can only probe whether ciphertexts are “legal”.
Das et al. showed that CCA1.5 sits strictly between CCA1 and CCA2 in the indistinguishability hierarchy, i.e.
Formal Definition
The IND-CCA1.5 game is defined for a public-key encryption scheme
- Setup. The challenger generates
and gives to . - Phase 1 (pre-challenge):
has access to a full decryption oracle and may submit arbitrary ciphertexts for decryption. - Challenge:
outputs two equal-length messages . The challenger samples , computes , and sends to . - Phase 2 (post-challenge):
has access to a ciphertext verification oracle which, on input , responds
The explicit "
- Guess:
outputs a guess .
The advantage is defined as:
The scheme is IND-CCA1.5 secure if this advantage is negligible for all PPT adversaries.
Compared to CCA2, Phase 2 is weakened from a full decryption oracle to a single-bit validity indicator. Compared to CCA1, Phase 2 is strengthened from no oracle at all to that validity indicator. Compared to CCVA2, Phase 1 is strengthened from a verification oracle to a full decryption oracle. This is exactly the setting in which an attacker first has privileged access to a decryption box and then only retains a “judge” or “reaction” signal from a remote server.
Remark (on the challenge-ciphertext bypass). Not all papers that consider CCA1.5 consistently include the ”
Attacks & Relevance
The CCA1.5 model is motivated by network-style adversaries: a protocol that returns distinct error codes (or exhibits timing differences) when a malformed ciphertext is submitted leaks exactly one bit per query - the validity bit captured by
Beyond the motivating model, Das et al. complete the relationship map among the existing indistinguishability notions by proving the following strict separations (in addition to the trivial implications):
(Theorem 1), from which and follow as corollaries. (Theorem 2), closing a question that had been open since Krohn’s thesis for the class of schemes in which returns on every invalid ciphertext. and (Corollaries 3 and 4). (Theorem 3): even the conjunction of a pre-challenge decryption oracle and a both-phase verification oracle does not suffice, ruling out a naive decomposition of the notion into its two individual oracles. (Theorem 5), instantiated by the Cramer-Shoup Lite scheme under the DDH assumption.
They also show the upward direction
Achieving This Notion
The main constructive result of the paper is that CCA1.5 is achievable by group homomorphic cryptosystems. Starting from the generic group-homomorphic framework of Armknecht, Katzenbeisser, and Peter (DCC 2012) - which gives CCA1-secure instantiations of Paillier and GBD under the Splitting Oracle-Assisted Subgroup Membership (SOAP) assumption - Das et al. show that a slight modification (essentially prepending a one-bit tag marking the ciphertext as “honestly generated”) turns any such IND-CCA1-secure group homomorphic scheme into an IND-CCA1.5-secure one while remaining group homomorphic. At the time of publication this was the strongest security level known to be achievable by any group homomorphic cryptosystem, the previous best being CCA1.
Beyond the homomorphic setting, they also prove that Cramer-Shoup Lite (already known to be IND-CCA1 and IND-CCVA2 secure) is additionally IND-CCA1.5 secure under DDH, and give a non-homomorphic variant of Cramer-Shoup Lite to show that the class of IND-CCA1.5-secure schemes is not limited to (group) homomorphic constructions.
In the FHE setting, CCA1.5 is achievable via vCCA. Naively, an unfiltered verification oracle would indeed be dangerous for a homomorphic scheme: given
A note on formulations. The formal definition above is the classical, single-argument verification oracle
Further Reading
The CCA1.5 notion was introduced by Das, Dutta, and Adhikari (ProvSec 2013), which also resolves the remaining open implications and separations among CPA, CCA1, CCA2, CCVA1, CCVA2, and RCCA. The ciphertext verification oracle itself was previously formalised by Pandey, Sarkar, and Jhanwar (SPACE 2012) as CCVA, building on earlier informal notions of “illegal ciphertext attack” and “reaction attack”. For the group-homomorphic framework used in the CCA1.5 construction, see Armknecht, Katzenbeisser, and Peter (DCC 2012). For the FHE-oriented reframing of CCA1.5, where the post-challenge validity check is replaced by a SNARK-based witness extractor, see Manulis and Nguyen (Eurocrypt 2024) on vCCA and Brzuska et al. (CIC 2025) on vCCAD.