Improved lattice-based CCA2-secure PKE in the standard model

被引:0
|
作者
Jiang Zhang
Yu Yu
Shuqin Fan
Zhenfeng Zhang
机构
[1] State Key Laboratory of Cryptology,Guangdong Provincial Key Laboratory of Data Security and Privacy Protection
[2] Jinan University,Department of Computer Science and Engineering
[3] Shanghai Jiao Tong University,Trusted Computing and Information Assurance Laboratory, Institute of Software
[4] Chinese Academy of Sciences,undefined
来源
关键词
lattice; public-key encryption; chosen ciphertext security; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the identity-based encryption (IBE) from lattices by Agrawal et al. (Eurocrypt’10), Micciancio and Peikert (Eurocrypt’12) presented a CCA1-secure public-key encryption (PKE), which has the best known efficiency in the standard model and can be used to obtain a CCA2-secure PKE from lattices by using the generic BCHK transform (SIAM J Comput, 2006) with a cost of introducing extra overheads to both computation and storage for the use of other primitives such as signatures and commitments. In this paper, we propose a more efficient standard model CCA2-secure PKE from lattices by carefully combining a different message encoding (which encodes the message into the most significant bits of the LWE’s “secret term”) with several nice algebraic properties of the tag-based lattice trapdoor and the LWE problem (such as unique witness and additive homomorphism). Compared to the best known lattice-based CCA1-secure PKE in the standard model due to Micciancio and Peikert (Eurocrypt’12), we not only directly achieve the CCA2-security without using any generic transform (and thus do not use signatures or commitments), but also reduce the noise parameter roughly by a factor of 3. This improvement makes our CCA2-secure PKE more efficient in terms of both computation and storage. In particular, when encrypting a 256-bit (respectively, 512-bit) message at 128-bit (respectively, 256-bit) security, the ciphertext size of our CCA2-secure PKE is even 33%–44% (respectively, 36%–46%) smaller than that of their CCA1-secure PKE.
引用
收藏
相关论文
共 50 条
  • [41] Lattice-based certificateless public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    International Journal of Information Security, 2014, 13 : 315 - 333
  • [42] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [43] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [44] Lattice-Based Secure Biometric Authentication for Hamming Distance
    Cheon, Jung Hee
    Kim, Dongwoo
    Kim, Duhyeong
    Lee, Joohee
    Shin, Junbum
    Song, Yongsoo
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 653 - 672
  • [45] A secure lattice-based anonymous authentication scheme for VANETs
    Liu, Hui
    Sun, Yining
    Xu, Yan
    Xu, Rui
    Wei, Zhuo
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 66 - 73
  • [46] A strongly secure lattice-based key exchange protocol
    Wen, Weiqiang
    Wang, Libin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2258 - 2269
  • [47] Compact and Provably Secure Lattice-Based Signatures in Hardware
    Howe, James
    Rafferty, Ciara
    Khalid, Ayesha
    O'Neill, Maire
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [48] A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
    Zhang, Lili
    Ma, Yanqin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [49] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [50] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2019, 26 (04) : 70 - 79