Lattice-based completely non-malleable public-key encryption in the standard model

被引:0
|
作者
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
机构
[1] Macquarie University,Department of Computing
来源
关键词
Public-key encryption; Complete non-malleability; Lattice; Standard model; 94A60; 11T71; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
引用
收藏
页码:293 / 313
页数:20
相关论文
共 50 条
  • [1] Lattice-based completely non-malleable public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (02) : 293 - 313
  • [2] Lattice-Based Completely Non-malleable PKE in the Standard Model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 407 - 411
  • [3] Non-malleable Multiple Public-Key Encryption
    Fujioka, Atsushi
    Fujisaki, Eiichiro
    Xagawa, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06): : 1318 - 1334
  • [4] Lattice-based certificateless public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    International Journal of Information Security, 2014, 13 : 315 - 333
  • [5] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [6] Efficient Completely Non-malleable Public Key Encryption
    Libert, Benoit
    Yung, Moti
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT I, 2010, 6198 : 127 - +
  • [7] Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Joseph K.
    Parampalli, Udaya
    Yuen, Tsz Hon
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 901 - 906
  • [8] Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
    Roy, Partha Sarathi
    Dung Hoang Duong
    Susilo, Willy
    Sipasseuth, Arnaud
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    THEORETICAL COMPUTER SCIENCE, 2022, 929 : 124 - 139
  • [9] Completely non-malleable encryption revisited
    Ventre, Carmine
    Visconti, Ivan
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 65 - 84
  • [10] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,