Post-Quantum Multi-Recipient Public Key Encryption

被引:0
|
作者
Alwen, Joel [1 ]
Hartmann, Dominik [2 ]
Kiltz, Eike [2 ]
Mularczyk, Marta [1 ]
Schwabe, Peter [3 ,4 ]
机构
[1] Amazoncom Inc, Seattle, WA 98108 USA
[2] Ruhr Univ Bochum, Bochum, Germany
[3] Max Planck Inst Secur & Privacy, Bochum, Germany
[4] Radboud Univ Nijmegen, Bochum, Germany
基金
欧洲研究理事会;
关键词
multi recipient; public key encryption; key encapsulation mechanism; post-quantum security; SECURITY; ENCAPSULATION;
D O I
10.1145/3576915.3623185
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A multi-message multi-recipient PKE (mmPKE) encrypts a batch of messages, in one go, to a corresponding set of independently chosen receiver public keys. The resulting "multi-recipient ciphertext" can be then be reduced (by any 3rd party) to a shorter, receiver specific, "invidual ciphertext". Finally, to recover the i-th message in the batch from their indvidual ciphertext the i-th receiver only needs their own decryption key. A special case of mmPKE is multi-recipient PKE (mPKE) where all receivers are sent the same message. By treating (m)mPKE and their KEM counterparts as a stand-alone primitives we allow for more efficient constructions than trivially composing individual PKE/KEM instances. This is especially valuable in the post-quantum setting, where PKE/KEM ciphertexts and public keys tend to be far larger than their classic counterparts. In this work we describe a collection of new results around mKEMs and (m)mPKEs. We provide both classic and post-quantum proofs for all results. Our results are geared towards practical constructions and applications (for example in the domain of PQ-secure group messaging). Concretely, our results include a new non-adaptive to adaptive compiler for CPA-secure mKEMs resulting in public keys roughly half the size of the previous state-of-the-art [Hashimoto et.al., CCS'21]. We also prove their FO transform for mKEMs to be secure in the presence of adaptive corruptions in the quantum random oracle model. Further, we provide the first mKEM combiner. Finally, we give two mmPKE constructions. The first is an arbitrary message-length black-box construction from an mKEM (e.g. one produced by combining a PQ with a classic mKEM). The second is optimized for short messages (which is suited for several recent mmPKE applications) and achieves hybrid PQ/classic security more directly. When encrypting.. short messages at 256-bits of security the mmPKE ciphertext are 144n bytes shorter than the generic construction. Finally, we provide an optimized implementation of the (CCA secure) mKEM construction based on the NIST PQC winner Kyber and report benchmarks showing a significant speedup for encapsulation and up to 79% savings in ciphertext size compared to a naive solution.
引用
下载
收藏
页码:1108 / 1122
页数:15
相关论文
共 50 条
  • [21] Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
    Xu, Shiyuan
    Cao, Yibo
    Chen, Xue
    Zhao, Yanmin
    Yiu, Siu-Ming
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 274 - 298
  • [22] Multiplex encryption: A practical approach to encrypting multi-recipient emails
    Wei, W
    Ding, XH
    Chen, KF
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 269 - 279
  • [23] Multi-Recipient Certificate-Based Searchable Encryption Scheme
    Liu H.
    Ming Y.
    Wang C.-H.
    Zhao Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 544 - 557
  • [24] Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT (vol 26, pg 1543, 2021)
    Li, Jing
    Tang, Xiangyan
    Wei, Zhijun
    Wang, Yu
    Chen, Wenbin
    Tan, Yu-an
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1551 - 1551
  • [25] Post-quantum commutative encryption algorithm
    Moldovyan, A. A.
    Moldovyan, D. N.
    Moldovyan, N. A.
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2019, 27 (03) : 299 - 317
  • [26] Randomness re-use in multi-recipient encryption schemes
    Bellare, M
    Boldyreva, A
    Staddon, J
    PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 85 - 99
  • [27] Post-quantum Commutative Encryption Algorithm
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Han Ngoc Phieu
    Minh Hieu Nguyen
    CONTEXT-AWARE SYSTEMS AND APPLICATIONS, AND NATURE OF COMPUTATION AND COMMUNICATION, 2019, 298 : 205 - 214
  • [28] Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR
    Cheon, Jung Hee
    Kim, Duhyeong
    Lee, Joohee
    Song, Yongsoo
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 160 - 177
  • [29] Performance Evaluation for a Post-Quantum Public-Key Cryptosystem
    Prantl, Thomas
    Prantl, Dominik
    Beierlieb, Lukas
    Ifflaender, Lukas
    Dmitrienko, Alexandra
    Kounev, Samuel
    Krupitzer, Christian
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,
  • [30] Multi-Recipient encryption with keyword search without pairing for cloud storage
    Yang, Ningbin
    Zhou, Quan
    Huang, Qiong
    Tang, Chunming
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):