Improved lattice-based CCA2-secure PKE in the standard model

被引:0
|
作者
Jiang Zhang
Yu Yu
Shuqin Fan
Zhenfeng Zhang
机构
[1] State Key Laboratory of Cryptology,Guangdong Provincial Key Laboratory of Data Security and Privacy Protection
[2] Jinan University,Department of Computer Science and Engineering
[3] Shanghai Jiao Tong University,Trusted Computing and Information Assurance Laboratory, Institute of Software
[4] Chinese Academy of Sciences,undefined
来源
关键词
lattice; public-key encryption; chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the identity-based encryption (IBE) from lattices by Agrawal et al. (Eurocrypt’10), Micciancio and Peikert (Eurocrypt’12) presented a CCA1-secure public-key encryption (PKE), which has the best known efficiency in the standard model and can be used to obtain a CCA2-secure PKE from lattices by using the generic BCHK transform (SIAM J Comput, 2006) with a cost of introducing extra overheads to both computation and storage for the use of other primitives such as signatures and commitments. In this paper, we propose a more efficient standard model CCA2-secure PKE from lattices by carefully combining a different message encoding (which encodes the message into the most significant bits of the LWE’s “secret term”) with several nice algebraic properties of the tag-based lattice trapdoor and the LWE problem (such as unique witness and additive homomorphism). Compared to the best known lattice-based CCA1-secure PKE in the standard model due to Micciancio and Peikert (Eurocrypt’12), we not only directly achieve the CCA2-security without using any generic transform (and thus do not use signatures or commitments), but also reduce the noise parameter roughly by a factor of 3. This improvement makes our CCA2-secure PKE more efficient in terms of both computation and storage. In particular, when encrypting a 256-bit (respectively, 512-bit) message at 128-bit (respectively, 256-bit) security, the ciphertext size of our CCA2-secure PKE is even 33%–44% (respectively, 36%–46%) smaller than that of their CCA1-secure PKE.
引用
收藏
相关论文
共 50 条
  • [1] Improved lattice-based CCA2-secure PKE in the standard model
    Jiang ZHANG
    Yu YU
    Shuqin FAN
    Zhenfeng ZHANG
    Science China(Information Sciences), 2020, 63 (08) : 147 - 168
  • [2] Improved lattice-based CCA2-secure PKE in the standard model
    Zhang, Jiang
    Yu, Yu
    Fan, Shuqin
    Zhang, Zhenfeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (08)
  • [3] An efficient leakage-resilient and CCA2-secure PKE system
    Zhang M.-W.
    Chen M.-W.
    He D.-B.
    Yang B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (03): : 492 - 502
  • [4] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [5] Lattice-Based Completely Non-malleable PKE in the Standard Model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 407 - 411
  • [6] Lattice codes for lattice-based PKE
    Lyu, Shanxiang
    Liu, Ling
    Ling, Cong
    Lai, Junzuo
    Chen, Hao
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 917 - 939
  • [7] Bounded CCA2-secure encryption
    Cramer, Ronald
    Hanaoka, Goichiro
    Hofheinz, Dennis
    Imai, Hideki
    Kiltz, Eike
    Pass, Rafael
    Shelat, Abhi
    Vaikuntanathan, Vinod
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 502 - +
  • [8] Improved Lattice-Based Signcryption in the Standard Model
    Yang, Xiaopeng
    Cao, Hao
    Li, Weichun
    Xuan, Hejun
    IEEE ACCESS, 2019, 7 : 155552 - 155562
  • [9] A simple lattice-based PKE scheme
    Zhou, Limin
    Hu, Zhengming
    Lv, Fengju
    SPRINGERPLUS, 2016, 5
  • [10] CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
    Xu, Shengfeng
    Li, Xiangxue
    Qian, Haifeng
    Chen, Kefei
    THEORETICAL COMPUTER SCIENCE, 2021, 885 : 91 - 103