Quantum CCA-Secure PKE, Revisited

被引:0
|
作者
Alamati, Navid [1 ]
Maram, Varun [2 ]
机构
[1] VISA Res, Foster City, CA USA
[2] SandboxAQ, London, England
来源
关键词
Quantum CCA security; Key-Dependent Message security; hash proof systems; quantum adaptive TDFs; One-Way To Hiding lemma; CHOSEN-CIPHERTEXT SECURITY; ZERO-KNOWLEDGE PROOF; ENCRYPTION;
D O I
10.1007/978-3-031-57728-4_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security against chosen-ciphertext attacks (CCA) concerns privacy of messages even if the adversary has access to the decryption oracle. While the classical notion of CCA security seems to be strong enough to capture many attack scenarios, it falls short of preserving the privacy of messages in the presence of quantum decryption queries, i.e., when an adversary can query a superposition of ciphertexts. Boneh and Zhandry (CRYPTO 2013) defined the notion of quantum CCA (qCCA) security to guarantee privacy of messages in the presence of quantum decryption queries. However, their construction is based on an exotic cryptographic primitive (namely, identity-based encryption with security against quantum queries), for which only one instantiation is known. In this work, we comprehensively study qCCA security for public-key encryption (PKE) based on both generic cryptographic primitives and concrete mathematical assumptions, yielding the following results: . We show that key-dependent message secure encryption (along with PKE) is sufficient to realize qCCA-secure PKE. This yields the first construction of qCCA-secure PKE from the LPN assumption. . We prove that hash proof systems imply qCCA-secure PKE, which results in the first instantiation of PKE with qCCA security from (isogeny-based) group actions. . We extend the notion of adaptive TDFs (ATDFs) to the quantum setting by introducing quantum ATDFs, and we prove that quantum ATDFs are sufficient to realize qCCA-secure PKE. We also show how to instantiate quantum ATDFs from the LWE assumption. . We show that a single-bit qCCA-secure PKE is sufficient to realize a multi-bit qCCA-secure PKE by extending the completeness of bit encryption for CCA security to the quantum setting.
引用
收藏
页码:193 / 226
页数:34
相关论文
共 50 条
  • [31] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [32] Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 132 - 143
  • [33] Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 350 - 362
  • [34] An efficient leakage-resilient and CCA2-secure PKE system
    Zhang M.-W.
    Chen M.-W.
    He D.-B.
    Yang B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (03): : 492 - 502
  • [35] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
  • [36] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [37] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [38] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Benoît Libert
    Moti Yung
    Journal of Cryptology, 2020, 33 : 1405 - 1441
  • [39] Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions
    Libert, Benoit
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1405 - 1441
  • [40] Verifiability-based conversion from CPA to CCA-secure predicate encryption
    Nandi, Mridul
    Pandit, Tapas
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2018, 29 (01) : 77 - 102