Quantum CCA-Secure PKE, Revisited

被引:0
|
作者
Alamati, Navid [1 ]
Maram, Varun [2 ]
机构
[1] VISA Res, Foster City, CA USA
[2] SandboxAQ, London, England
来源
关键词
Quantum CCA security; Key-Dependent Message security; hash proof systems; quantum adaptive TDFs; One-Way To Hiding lemma; CHOSEN-CIPHERTEXT SECURITY; ZERO-KNOWLEDGE PROOF; ENCRYPTION;
D O I
10.1007/978-3-031-57728-4_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security against chosen-ciphertext attacks (CCA) concerns privacy of messages even if the adversary has access to the decryption oracle. While the classical notion of CCA security seems to be strong enough to capture many attack scenarios, it falls short of preserving the privacy of messages in the presence of quantum decryption queries, i.e., when an adversary can query a superposition of ciphertexts. Boneh and Zhandry (CRYPTO 2013) defined the notion of quantum CCA (qCCA) security to guarantee privacy of messages in the presence of quantum decryption queries. However, their construction is based on an exotic cryptographic primitive (namely, identity-based encryption with security against quantum queries), for which only one instantiation is known. In this work, we comprehensively study qCCA security for public-key encryption (PKE) based on both generic cryptographic primitives and concrete mathematical assumptions, yielding the following results: . We show that key-dependent message secure encryption (along with PKE) is sufficient to realize qCCA-secure PKE. This yields the first construction of qCCA-secure PKE from the LPN assumption. . We prove that hash proof systems imply qCCA-secure PKE, which results in the first instantiation of PKE with qCCA security from (isogeny-based) group actions. . We extend the notion of adaptive TDFs (ATDFs) to the quantum setting by introducing quantum ATDFs, and we prove that quantum ATDFs are sufficient to realize qCCA-secure PKE. We also show how to instantiate quantum ATDFs from the LWE assumption. . We show that a single-bit qCCA-secure PKE is sufficient to realize a multi-bit qCCA-secure PKE by extending the completeness of bit encryption for CCA security to the quantum setting.
引用
收藏
页码:193 / 226
页数:34
相关论文
共 50 条
  • [1] Direct CCA-Secure KEM and Deterministic PKE from Plain LWE
    Boyen, Xavier
    Li, Qinyi
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 116 - 130
  • [2] A new hierarchical ID-based cryptosystem and CCA-secure PKE
    Li, Jin
    Zhang, Fangguo
    Wang, Yanming
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 362 - 371
  • [3] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [4] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [5] Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption
    Gan, Yuanju
    Wang, Lihua
    Wang, Licheng
    Pan, Ping
    Yang, Yixian
    COMPUTER JOURNAL, 2013, 56 (10): : 1249 - 1257
  • [6] A CCA-secure Verifiable Mix-net
    Li, Long-Hai
    Huang, Cheng-Qiang
    Fu, Shao-Feng
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 239 - 245
  • [7] Tightly CCA-Secure Encryption Without Pairings
    Gay, Romain
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 1 - 27
  • [8] A generic construction of CCA-secure deterministic encryption
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Wang, Xin
    Zhou, Yanwei
    Xia, Zhe
    INFORMATION PROCESSING LETTERS, 2020, 154 (154)
  • [9] A Proposed CCA-secure Encryption on an ElGamal Variant
    Asbullah, M. A.
    Ariffin, M. R. K.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 499 - 503
  • [10] Fault attacks on cca-secure lattice kems
    Pessl P.
    Prokop L.
    1600, Ruhr-University of Bochum (2021): : 37 - 60