Lattice-based completely non-malleable public-key encryption in the standard model

被引:0
|
作者
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
机构
[1] Macquarie University,Department of Computing
来源
关键词
Public-key encryption; Complete non-malleability; Lattice; Standard model; 94A60; 11T71; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
引用
收藏
页码:293 / 313
页数:20
相关论文
共 50 条
  • [21] Constant-round concurrent non-malleable zero knowledge in the Bare Public-Key model
    Ostrovsky, Rafail
    Persiano, Giuseppe
    Visconti, Ivan
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 548 - +
  • [22] A lattice-based designated-server public-key authenticated encryption with keyword search
    Fan, Yajun
    Qin, Baodong
    Zheng, Dong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 145
  • [23] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [24] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    Wireless Personal Communications, 2018, 100 : 907 - 921
  • [25] Chosen-ciphertext lattice-based public key encryption with equality test in standard model
    Dung Hoang Duong
    Roy, Partha Sarathi
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Sipasseuth, Arnaud
    THEORETICAL COMPUTER SCIENCE, 2022, 905 : 31 - 53
  • [26] Lattice-based public-key cryptosystems and security analysis
    Huang, Qiong
    Zhao, Yiming
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (10): : 60 - 62
  • [27] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 1 - +
  • [28] A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack
    Pan, Yanbin
    Deng, Yingpu
    Jiang, Yupeng
    Tu, Ziran
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 126 - +
  • [29] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [30] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    Cluster Computing, 2022, 25 : 2305 - 2316