gCCA
Generalized Chosen Ciphertext Attack
Introduced In
- On the Security of Joint Signature and Encryption
Jee Hea An, Yevgeniy Dodis, Tal Rabin (2002)
Relations
Implied By
Implies
Overview
Generalized Chosen Ciphertext Attack (gCCA) security, introduced by An, Dodis, and Rabin at Eurocrypt 2002, is a very slight relaxation of CCA2 designed to repair a definitional shortcoming of the standard notion.
The authors observed that the usual CCA2 attack model - in which the adversary is disallowed from submitting only the exact challenge ciphertext
The fix proposed by An, Dodis, and Rabin is to parameterize the CCA2 game by an efficient decryption-respecting equivalence relation
An, Dodis, and Rabin argue that gCCA suffices for all known applications of CCA2-secure encryption while no longer suffering from the definitional fragility of CCA2 under syntactic rewrites. The same notion was proposed independently - under the name benign malleability - by Shoup for the ISO 18033-2 public-key encryption standard.
Formal Definition
A binary relation
The relation may depend on the public key
- The challenger generates
and gives to . - Phase 1 (pre-challenge):
has access to a decryption oracle and may submit arbitrary ciphertexts for decryption. outputs two equal-length messages . - The challenger samples
, computes , and sends to . - Phase 2 (post-challenge):
retains access to the decryption oracle, but any query satisfying is rejected. outputs a guess .
The advantage is defined as:
The scheme
An, Dodis, and Rabin also introduce a non-malleability analogue,
Attacks & Relevance
The original motivation for gCCA is definitional, not attack-driven: the aim is to rule out scheme-level syntactic triviality (such as the useless-trailing-bit counter-example) while still preventing every meaningful chosen-ciphertext attack that CCA2 prevents. In particular, classical attacks that CCA2 is designed to thwart - Bleichenbacher-style padding oracles, ciphertext mauling via homomorphic structure, and related-ciphertext attacks - remain blocked under gCCA, since any successful attack on gCCA translates into a meaningful non-equivalent decryption query. An, Dodis, and Rabin use gCCA as the right-level abstraction for proving the security of generic signcryption compositions such as
In the FHE context, gCCA remains incompatible with homomorphic evaluation for the same reason as CCA2. Given a challenge
Achieving This Notion
Any IND-CCA2-secure encryption scheme is immediately IND-gCCA-secure (under the equality relation), so all the classical CCA2 constructions - Cramer-Shoup, Fujisaki-Okamoto, OAEP, and lattice-based KEMs - yield gCCA-secure schemes. The converse does not hold: An, Dodis, and Rabin exhibit gCCA-secure schemes that are not CCA2-secure, precisely the “append a useless bit to a CCA2-secure scheme” family and similar syntactic modifications. They remark, however, that they are not aware of any natural encryption scheme that sits in the gap between gCCA and CCA2 - the separating examples are always obtained by artificially degrading a CCA2-secure scheme.
As a standardized instance, Shoup’s benign malleability variant in ISO 18033-2 uses a concrete efficient relation
Further Reading
The gCCA notion was introduced by An, Dodis, and Rabin (Eurocrypt 2002) as part of their formal study of signcryption, where it was used to prove the security of generic encrypt-then-sign and sign-then-encrypt compositions in the public-key setting (under the original name generalized CCA2, denoted