Improved lattice-based CCA2-secure PKE in the standard model

被引:0
|
作者
Jiang Zhang
Yu Yu
Shuqin Fan
Zhenfeng Zhang
机构
[1] State Key Laboratory of Cryptology,Guangdong Provincial Key Laboratory of Data Security and Privacy Protection
[2] Jinan University,Department of Computer Science and Engineering
[3] Shanghai Jiao Tong University,Trusted Computing and Information Assurance Laboratory, Institute of Software
[4] Chinese Academy of Sciences,undefined
来源
关键词
lattice; public-key encryption; chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the identity-based encryption (IBE) from lattices by Agrawal et al. (Eurocrypt’10), Micciancio and Peikert (Eurocrypt’12) presented a CCA1-secure public-key encryption (PKE), which has the best known efficiency in the standard model and can be used to obtain a CCA2-secure PKE from lattices by using the generic BCHK transform (SIAM J Comput, 2006) with a cost of introducing extra overheads to both computation and storage for the use of other primitives such as signatures and commitments. In this paper, we propose a more efficient standard model CCA2-secure PKE from lattices by carefully combining a different message encoding (which encodes the message into the most significant bits of the LWE’s “secret term”) with several nice algebraic properties of the tag-based lattice trapdoor and the LWE problem (such as unique witness and additive homomorphism). Compared to the best known lattice-based CCA1-secure PKE in the standard model due to Micciancio and Peikert (Eurocrypt’12), we not only directly achieve the CCA2-security without using any generic transform (and thus do not use signatures or commitments), but also reduce the noise parameter roughly by a factor of 3. This improvement makes our CCA2-secure PKE more efficient in terms of both computation and storage. In particular, when encrypting a 256-bit (respectively, 512-bit) message at 128-bit (respectively, 256-bit) security, the ciphertext size of our CCA2-secure PKE is even 33%–44% (respectively, 36%–46%) smaller than that of their CCA1-secure PKE.
引用
收藏
相关论文
共 50 条
  • [21] MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU
    Akleylek, Sedat
    Cevik, Nursah
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (07)
  • [22] A new hierarchical ID-based cryptosystem and CCA-secure PKE
    Li, Jin
    Zhang, Fangguo
    Wang, Yanming
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 362 - 371
  • [23] Lattice-Based IBE with Equality Test in Standard Model
    Dung Hoang Duong
    Le, Huy Quoc
    Roy, Partha Sarathi
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 19 - 40
  • [24] Lattice-based signcryption with equality test in standard model
    Le, Huy Quoc
    Duong, Dung Hoang
    Roy, Partha Sarathi
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    COMPUTER STANDARDS & INTERFACES, 2021, 76 (76)
  • [25] Lattice-based linearly homomorphic signatures in the standard model
    Chen, Wenbin
    Lei, Hao
    Qi, Ke
    THEORETICAL COMPUTER SCIENCE, 2016, 634 : 47 - 54
  • [26] Lattice-based proxy signature scheme in the standard model
    Li, M.-X. (limingxiang2008@gmail.com), 1600, Sichuan University (46):
  • [27] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [28] Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model
    Susilo, Willy
    Dutta, Priyanka
    Duong, Dung Hoang
    Roy, Partha Sarathi
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 169 - 191
  • [29] Lightweight and CCA2-Secure Hardware Implementation of Binary Ring-LWE
    Shahbazi, Karim
    Ko, Seok-Bum
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1170 - 1174
  • [30] A Power Side-Channel Attack on the CCA2-Secure HQC KEM
    Schamberger, Thomas
    Renner, Julian
    Sigl, Georg
    Wachter-Zeh, Antonia
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2020, 2021, 12609 : 119 - 134