Lattice-based completely non-malleable public-key encryption in the standard model

被引:0
|
作者
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
机构
[1] Macquarie University,Department of Computing
来源
关键词
Public-key encryption; Complete non-malleability; Lattice; Standard model; 94A60; 11T71; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
引用
收藏
页码:293 / 313
页数:20
相关论文
共 50 条
  • [31] Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
    Alawatugoda, Janaka
    COMPUTER JOURNAL, 2020, 63 (12): : 1904 - 1914
  • [32] Public-key encryption in the standard model against strong leakage adversary
    Alawatugoda, Janaka
    Computer Journal, 2020, 63 (12): : 1904 - 1914
  • [33] Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
    Behnia, Rouzbeh
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1269 - 1282
  • [34] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [35] Public-Key Encryption with Keyword Search from Lattice
    Hou, Changjiang
    Liu, Fei
    Bai, Hongtao
    Ren, Lanfang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 336 - 339
  • [36] Novel construction of forward-secure public-key encryption in the standard model
    Lu, Y., 1600, Editorial Board of Journal on Communications (35):
  • [37] A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS
    Yao, Yu
    Huang, Jiawei
    Khanna, Sudhanshu
    Helat, Abhi
    Calhoun, Benton Highsmith
    Lach, John
    Evans, David
    RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 96 - 113
  • [38] A Practical Quantum Public-key Encryption Model
    Wang, Yuqi
    She, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 367 - 372
  • [39] Lattice-Based Revocable Certificateless Public Key Encryption for Team Score Orienteering
    Zhao, You
    Yan, Mingyan
    Yan, Kaien
    Li, Juyan
    MATHEMATICS, 2024, 12 (11)
  • [40] Lattice-based identity-based resplittable threshold public key encryption scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) : 289 - 307