Post-Quantum Multi-Recipient Public Key Encryption

被引:0
|
作者
Alwen, Joel [1 ]
Hartmann, Dominik [2 ]
Kiltz, Eike [2 ]
Mularczyk, Marta [1 ]
Schwabe, Peter [3 ,4 ]
机构
[1] Amazoncom Inc, Seattle, WA 98108 USA
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Max Planck Inst Secur & Privacy, Bochum, Germany
[4] Radboud Univ Nijmegen, Bochum, Germany
基金
欧洲研究理事会;
关键词
multi recipient; public key encryption; key encapsulation mechanism; post-quantum security; SECURITY; ENCAPSULATION;
D O I
10.1145/3576915.3623185
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A multi-message multi-recipient PKE (mmPKE) encrypts a batch of messages, in one go, to a corresponding set of independently chosen receiver public keys. The resulting "multi-recipient ciphertext" can be then be reduced (by any 3rd party) to a shorter, receiver specific, "invidual ciphertext". Finally, to recover the i-th message in the batch from their indvidual ciphertext the i-th receiver only needs their own decryption key. A special case of mmPKE is multi-recipient PKE (mPKE) where all receivers are sent the same message. By treating (m)mPKE and their KEM counterparts as a stand-alone primitives we allow for more efficient constructions than trivially composing individual PKE/KEM instances. This is especially valuable in the post-quantum setting, where PKE/KEM ciphertexts and public keys tend to be far larger than their classic counterparts. In this work we describe a collection of new results around mKEMs and (m)mPKEs. We provide both classic and post-quantum proofs for all results. Our results are geared towards practical constructions and applications (for example in the domain of PQ-secure group messaging). Concretely, our results include a new non-adaptive to adaptive compiler for CPA-secure mKEMs resulting in public keys roughly half the size of the previous state-of-the-art [Hashimoto et.al., CCS'21]. We also prove their FO transform for mKEMs to be secure in the presence of adaptive corruptions in the quantum random oracle model. Further, we provide the first mKEM combiner. Finally, we give two mmPKE constructions. The first is an arbitrary message-length black-box construction from an mKEM (e.g. one produced by combining a PQ with a classic mKEM). The second is optimized for short messages (which is suited for several recent mmPKE applications) and achieves hybrid PQ/classic security more directly. When encrypting.. short messages at 256-bits of security the mmPKE ciphertext are 144n bytes shorter than the generic construction. Finally, we provide an optimized implementation of the (CCA secure) mKEM construction based on the NIST PQC winner Kyber and report benchmarks showing a significant speedup for encapsulation and up to 79% savings in ciphertext size compared to a naive solution.
引用
收藏
页码:1108 / 1122
页数:15
相关论文
共 50 条
  • [1] Multi-recipient public key encryption scheme based on Weil Pairing
    Lu, Li
    Hu, Lei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2008, 19 (08): : 2159 - 2166
  • [2] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13277 LNCS : 402 - 432
  • [3] Revisiting Anonymity in Post-quantum Public Key Encryption
    Cheng, Yao
    Lu, Xianhui
    Li, Ziyi
    Li, Bao
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 336 - 370
  • [4] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432
  • [5] Multi-recipient Public-Key Encryption from Simulators in Security Proofs
    Hiwatari, Harunaga
    Tanaka, Keisuke
    Asano, Tomoyuki
    Sakumoto, Koichi
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 293 - +
  • [6] A new ID-based multi-recipient public-key encryption scheme
    [J]. Pang, L. (ljpang@mail.xidian.edu.cn), 1600, Chinese Institute of Electronics (22):
  • [7] A New ID-based Multi-Recipient Public-key Encryption Scheme
    Pang Liaojun
    Gao Lu
    Pei Qingqi
    Gui Jingjing
    Wang Yumin
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01) : 89 - 92
  • [8] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Li, Jing
    Tang, Xiangyan
    Wei, Zhijun
    Wang, Yu
    Chen, Wenbin
    Tan, Yu-an
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1543 - 1550
  • [9] Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search
    Yang, Yang
    Yang, Shu-Lve
    Wang, Feng-He
    Sun, Jin
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (02) : 485 - 497
  • [10] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
    Jing Li
    Xiangyan Tang
    Zhijun Wei
    Yu Wang
    Wenbin Chen
    Yu-an Tan
    [J]. Mobile Networks and Applications, 2021, 26 : 1543 - 1550