Lattice-based completely non-malleable public-key encryption in the standard model

被引:0
|
作者
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
机构
[1] Macquarie University,Department of Computing
来源
关键词
Public-key encryption; Complete non-malleability; Lattice; Standard model; 94A60; 11T71; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.
引用
收藏
页码:293 / 313
页数:20
相关论文
共 50 条
  • [41] Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again
    Zhang Kaiwei
    Ma, Ailun
    Lyu Shanxiang
    Wang Jiabo
    Lou Shuting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 1 - 10
  • [42] A non-associative lattice-based public key cryptosystem
    Malekian, Ehsan
    Zakerolhosseini, Ali
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 145 - 163
  • [43] Public-Key Encryption Based on Chebyshev Polynomials
    L. Kocarev
    J. Makraduli
    P. Amato
    Circuits, Systems and Signal Processing, 2005, 24 : 497 - 517
  • [44] Public-key encryption based on Chebyshev maps
    Kocarev, L
    Tasev, Z
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 28 - 31
  • [45] Public-key encryption based on Chebyshev polynomials
    Kocarev, L
    Makraduli, J
    Amato, P
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2005, 24 (05) : 497 - 517
  • [46] Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
    Moldovyan, Nikolay
    Berezin, Andrey
    Kornienko, Anatoly
    Moldovyan, Alexander
    PROCEEDINGS OF THE 20TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT 2017), 2017, : 284 - 289
  • [47] Lattice-based Encryption Over Standard Lattices in Hardware
    Howe, J.
    Moore, C.
    O'Neill, M.
    Regazzoni, F.
    Gueneysu, T.
    Beeden, K.
    2016 ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2016,
  • [48] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [49] Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
    Bellare, Mihir
    Viet Tung Hoang
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 627 - 656
  • [50] Lattice-based autonomous path proxy re-encryption in the standard model
    Wenli XIE
    Jian WENG
    Yao TONG
    Xiaojian LIANG
    Lisha YAO
    Feixiang ZHAO
    Science China(Information Sciences), 2023, 66 (10) : 184 - 195