Improved lattice-based CCA2-secure PKE in the standard model

被引:0
|
作者
Jiang ZHANG [1 ,2 ]
Yu YU [3 ]
Shuqin FAN [1 ]
Zhenfeng ZHANG [4 ]
机构
[1] State Key Laboratory of Cryptology
[2] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection,Jinan University
[3] Department of Computer Science and Engineering,Shanghai Jiao Tong University
[4] Trusted Computing and Information Assurance Laboratory,Institute of Software,Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
lattice; public-key encryption; chosen ciphertext security; standard model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency in the standard model and can be used to obtain a CCA2-secure PKE from lattices by using the generic BCHK transform(SIAM J Comput, 2006) with a cost of introducing extra overheads to both computation and storage for the use of other primitives such as signatures and commitments. In this paper, we propose a more efficient standard model CCA2-secure PKE from lattices by carefully combining a different message encoding(which encodes the message into the most significant bits of the LWE’s "secret term") with several nice algebraic properties of the tag-based lattice trapdoor and the LWE problem(such as unique witness and additive homomorphism). Compared to the best known lattice-based CCA1-secure PKE in the standard model due to Micciancio and Peikert(Eurocrypt’12), we not only directly achieve the CCA2-security without using any generic transform(and thus do not use signatures or commitments), but also reduce the noise parameter roughly by a factor of 3. This improvement makes our CCA2-secure PKE more efficient in terms of both computation and storage. In particular, when encrypting a 256-bit(respectively,512-bit) message at 128-bit(respectively, 256-bit) security, the ciphertext size of our CCA2-secure PKE is even 33%–44%(respectively, 36%–46%) smaller than that of their CCA1-secure PKE.
引用
收藏
页码:147 / 168
页数:22
相关论文
共 50 条
  • [1] Improved lattice-based CCA2-secure PKE in the standard model
    Zhang, Jiang
    Yu, Yu
    Fan, Shuqin
    Zhang, Zhenfeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (08)
  • [2] Improved lattice-based CCA2-secure PKE in the standard model
    Jiang Zhang
    Yu Yu
    Shuqin Fan
    Zhenfeng Zhang
    [J]. Science China Information Sciences, 2020, 63
  • [3] An efficient leakage-resilient and CCA2-secure PKE system
    Zhang, Ming-Wu
    Chen, Mi-Wen
    He, De-Biao
    Yang, Bo
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (03): : 492 - 502
  • [4] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi, Prasanna
    Roy, Sujoy Sinha
    Chattopadhyay, Anupam
    Bhasin, Shivam
    [J]. 1600, Ruhr-University of Bochum (2020): : 307 - 335
  • [5] Lattice-Based Completely Non-malleable PKE in the Standard Model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    [J]. INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 407 - 411
  • [6] Bounded CCA2-secure encryption
    Cramer, Ronald
    Hanaoka, Goichiro
    Hofheinz, Dennis
    Imai, Hideki
    Kiltz, Eike
    Pass, Rafael
    Shelat, Abhi
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 502 - +
  • [7] Lattice codes for lattice-based PKE
    Lyu, Shanxiang
    Liu, Ling
    Ling, Cong
    Lai, Junzuo
    Chen, Hao
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 917 - 939
  • [8] Improved Lattice-Based Signcryption in the Standard Model
    Yang, Xiaopeng
    Cao, Hao
    Li, Weichun
    Xuan, Hejun
    [J]. IEEE ACCESS, 2019, 7 : 155552 - 155562
  • [9] A simple lattice-based PKE scheme
    Zhou, Limin
    Hu, Zhengming
    Lv, Fengju
    [J]. SPRINGERPLUS, 2016, 5
  • [10] CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN
    Xu, Shengfeng
    Li, Xiangxue
    Qian, Haifeng
    Chen, Kefei
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 885 : 91 - 103