All-But-Many Lossy Trapdoor Functions from Lattices and Applications

被引:19
作者
Boyen, Xavier [1 ]
Li, Qinyi [1 ]
机构
[1] Queensland Univ Technol, Brisbane, Qld, Australia
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III | 2017年 / 10403卷
基金
澳大利亚研究理事会;
关键词
SECURE; ENCRYPTION; FRAMEWORK; EFFICIENT;
D O I
10.1007/978-3-319-63697-9_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
"All-but-many lossy trapdoor functions" (ABM-LTF) are a powerful cryptographic primitive studied by Hofheinz (Eurocrypt 2012). ABM-LTFs are parametrised with tags: a lossy tag makes the function lossy; an injective tag makes the function injective, and invertible with a trapdoor. Existing ABM-LTFs rely on non-standard assumptions. Our first result is an ABM-LTF construction from lattices, based on the learning-with-errors (LWE) problem. Unlike the previous schemes which behaved as "encrypted signatures", the core of our construction is an "encrypted, homomorphic-evaluation-friendly, weak pseudorandom function". The weak pseudorandom function outputs matrices, where the lossy tags are preimages of the zero matrix, and the injective tags are preimages of random full-rank matrices. Our second result is a public-key system tightly secure against "selective opening" attacks, where an attacker gets many challenges and can ask to see the random bits of any of them. Following the steps of Hemenway et al. (Asiacrypt 2011) and Hofheinz (Eurocrypt 2012), our ABM-LTF gives the first lattice-based, compact public-key encryption (PKE) scheme that has indistinguishability against adaptive chosen-ciphertext and selective opening attacks (IND-SO-CCA2), with tight security, and whose public-key size and security reduction are independent of the number of decryption queries and ciphertext challenges. Meanwhile, this result provides an alternative solution to the problem of building pairing-free IND-CCA2 PKE schemes with tight security in the multi-challenge setting, which was firstly answered by Gay et al. (Eurocrypt 2016). Additionally, our ABM-LTF answers the open question of constructing (non-necessarily lossy) all-but-many trapdoor functions from lattices, first asked by Alperin-Sheriff and Peikert (PKC 2012).
引用
收藏
页码:298 / 331
页数:34
相关论文
共 42 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]  
Akavia A., 2014, ITCS ITCS 14
[3]   Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions [J].
Alperin-Sheriff, Jacob .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 :236-255
[4]  
Alperin-Sheriff J, 2012, LECT NOTES COMPUT SC, V7293, P334, DOI 10.1007/978-3-642-30057-8_20
[5]  
[Anonymous], STOC 1996
[6]  
[Anonymous], 2005, STOC 2005
[7]  
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[8]  
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[9]  
Bellare M, 2011, 2011479 CRYPT EPRINT
[10]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7237, P228, DOI 10.1007/978-3-642-29011-4_15