Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices

被引:0
作者
Yang, Xiaopeng [1 ]
Ma, Wenping [1 ]
Zhang, Chengli [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
美国国家科学基金会; 高等学校博士学科点专项科研基金;
关键词
Cryptography; key encapsulation mechanism; indistinguishability under active chosenciphertext attacks; lattices; standard model; EXCHANGE; ENCRYPTION; PROTOCOL;
D O I
10.1080/00207160.2016.1149578
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Key encapsulation mechanism (KEM) is an important key distribution mechanism that not only allows both sender and receiver to safely share a random session key, but also can be mainly applied to construct a hybrid public key encryption scheme. In this paper, we give an positive answer to the question of if it is possible to build an efficient KEM over lattices. More precisely, wedesign an efficientKEMscheme in standard model based on ideal lattices. We prove that the proposed scheme captures indistinguishability against active chosen ciphertext attacks (IND-CCA) under the ring learning with errors problem, or more formally, IND-CCA security. Compared with the current CCA secure KEM schemes based on lattices in the standard model, our scheme has shorter public key, secret key and encapsulation ciphertext. In addition, our KEM scheme realizes IND-CCA security in the standard model.
引用
收藏
页码:866 / 883
页数:18
相关论文
共 36 条
[1]  
Abdalla M., 2001, DHIES ENCRYPTION SCH
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[4]  
American National Standards Institute, 2007, X9442007 ANSI
[5]  
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[6]  
Boyd C, 2008, LECT NOTES COMPUT SC, V5107, P69, DOI 10.1007/978-3-540-70500-0_6
[7]   Chosen-ciphertext security from identity-based encryption [J].
Canetti, R ;
Halevi, S ;
Katz, J .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 :207-222
[8]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2442, P143
[9]  
Chen Y., 2011, P 17 INT C THEOR APP
[10]   Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack [J].
Cramer, R ;
Shoup, V .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :167-226