Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext

被引:0
|
作者
Kota Takahashi
Keitaro Hashimoto
Wakaha Ogata
机构
[1] Tokyo Institute of Technology,
[2] National Institute of Advanced Industrial Science and Technology (AIST),undefined
来源
关键词
Threshold public-key encryption; Threshold decryption; Parallel encryption; Code-based cryptography; Classic McEliece; 94A60; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been proposed. In this paper, we provide three IND-CCA secure code-based threshold PKE schemes. The first scheme is the concrete instantiation of Dodis–Katz conversion (Dodis and Katz, TCC’05) that converts an IND-CCA secure PKE into an IND-CCA secure threshold PKE using parallel encryption and a signature scheme. This approach provides non-interactive threshold decryption, but ciphertexts are large (about 16 kilobytes for 128-bit security) due to long code-based signatures even in the state-of-the-art one. The second scheme is a new parallel encryption-based construction without signature schemes. Unlike the Dodis–Katz conversion, our parallel encryption converts an OW-CPA secure PKE into an OW-CPA secure threshold PKE. To enhance security, we use Cong et al.’s conversion (Cong et al., ASIACRYPT’21). Thanks to eliminating signatures, its ciphertext is 512 bytes, which is only 3% of the first scheme. The decryption process needs an MPC for computing hash functions, but decryption of OW-CPA secure PKE can be done locally. The third scheme is an MPC-based threshold PKE scheme from code-based assumption. We take the same approach Cong et al. took to construct efficient lattice-based threshold PKEs. We build an MPC for the decryption algorithm of OW-CPA secure Classic McEliece PKE. This scheme has the shortest ciphertext among the three schemes at just 192 bytes. Compared to the regular CCA secure Classic McEliece PKE, the additional ciphertext length is only 100 bytes. The cons are heavy distributed computation in the decryption process.
引用
收藏
页码:277 / 301
页数:24
相关论文
共 50 条
  • [41] Adaptive chosen ciphertext secure threshold key escrow scheme from pairing
    Long, Yu
    Chen, Kefei
    Liu, Shengli
    INFORMATICA, 2006, 17 (04) : 519 - 534
  • [42] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
  • [43] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    Deng, Robert H.
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 1 - +
  • [44] Concrete chosen-ciphertext secure encryption from subgroup membership problems
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 1 - +
  • [45] Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM
    Fang, Liming
    Wang, Jiandong
    Ren, Yongjun
    Xia, Jinyue
    Bian, Shizhu
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 326 - 330
  • [46] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [47] Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
    Seyhan, Kuebra
    Akleylek, Sedat
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [48] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256
  • [49] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Ting Wang
    Guoqiang Han
    Jianping Yu
    Peng Zhang
    Xiaoqiang Sun
    Wireless Personal Communications, 2017, 95 : 2973 - 2988
  • [50] New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
    Weng, Zhiwei
    Weng, Jian
    He, Kai
    Li, Yingkai
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2012, 6839 : 170 - 176