Abstract
Based on the identity-based encryption (IBE) from lattices by Agrawal et al. (Eurocrypt’10), Micciancio and Peikert (Eurocrypt’12) presented a CCA1-secure public-key encryption (PKE), which has the best known efficiency in the standard model and can be used to obtain a CCA2-secure PKE from lattices by using the generic BCHK transform (SIAM J Comput, 2006) with a cost of introducing extra overheads to both computation and storage for the use of other primitives such as signatures and commitments. In this paper, we propose a more efficient standard model CCA2-secure PKE from lattices by carefully combining a different message encoding (which encodes the message into the most significant bits of the LWE’s “secret term”) with several nice algebraic properties of the tag-based lattice trapdoor and the LWE problem (such as unique witness and additive homomorphism). Compared to the best known lattice-based CCA1-secure PKE in the standard model due to Micciancio and Peikert (Eurocrypt’12), we not only directly achieve the CCA2-security without using any generic transform (and thus do not use signatures or commitments), but also reduce the noise parameter roughly by a factor of 3. This improvement makes our CCA2-secure PKE more efficient in terms of both computation and storage. In particular, when encrypting a 256-bit (respectively, 512-bit) message at 128-bit (respectively, 256-bit) security, the ciphertext size of our CCA2-secure PKE is even 33%–44% (respectively, 36%–46%) smaller than that of their CCA1-secure PKE.
Similar content being viewed by others
References
Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inform Theor, 1976, 22: 644–654
Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 1978, 21: 120–126
Goldwasser S, Micali S. Probabilistic encryption. J Comput Syst Sci, 1984, 28: 270–299
Naor M, Yung M. Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, Baltimore, 1990. 427–437
Rackoff C, Simon D R. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Advances in Cryptology-CRYPTO’91. Berlin: Springer, 1992. 433–444
NIST. Post-quantum cryptography standardization. 2016. http://csrc.nist.gov/groups/ST/post-quantum-crypto/submission-requirements/index.html
Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. J Cryptol, 2013, 26: 80–101
Pointcheval D. Chosen-ciphertext security for any one-way cryptosystem. In: Public Key Cryptography. Berlin: Springer, 2000. 129–146
Targhi E E, Unruh D. Post-quantum security of the Fujisaki-Okamoto and OAEP transforms. In: Theory of Cryptography. Berlin: Springer, 2016. 192–216
Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited. J ACM, 2004, 51: 557–594
Gertner Y, Malkin T, Myers S. Towards a separation of semantic and CCA security for public key encryption. In: Theory of Cryptography. Berlin: Springer, 2007. 434–455
Sahai A. Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: Proceedings of the 40th Annual Symposium on Foundations of Computer Science, New York City, 1999. 543–553
Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM J Comput, 2000, 30: 391–437
Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput, 2001, 33: 167–226
Wee H. Efficient chosen-ciphertext security via extractable hash proofs. In: Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin: Springer, 2010. 314–332
Boneh D, Canetti R, Halevi S, et al. Chosen-ciphertext security from identity-based encryption. SIAM J Comput, 2006, 36: 1301–1328
Kiltz E. Chosen-ciphertext security from tag-based encryption. In: Theory of Cryptography. Berlin: Springer, 2006. 581–600
Peikert C, Waters B. Lossy trapdoor functions and their applications. In: Proceedings of STOC 2008. New York: ACM, 2008. 187–196
Rosen A, Segev G. Chosen-ciphertext security via correlated products. In: Theory of Cryptography. Berlin: Springer, 2009. 419–436
Kiltz E, Mohassel P, O’Neill A. Adaptive trapdoor functions and chosen-ciphertext security. In: Advances in Cryptology-EUROCRYPT 2010. Berlin: Springer, 2010. 673–692
Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput, 1997, 26: 1484–1509
Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Advances in Cryptology-CRYPTO’98. Berlin: Springer, 1998. 13–25
Katz J, Vaikuntanathan V. Smooth projective hashing and password-based authenticated key exchange from lattices. In: Advances in Cryptology-ASIACRYPT 2009. Berlin: Springer, 2009. 636–652
Peikert C, Vaikuntanathan V, Waters B. A framework for efficient and composable oblivious transfer. In: Advances in Cryptology-CRYPTO 2008. Berlin: Springer, 2008. 554–571
Benhamouda F, Blazy O, Ducas L, et al. Hash proof systems over lattices revisited. In: Public-Key Cryptography-PKC 2018. Berlin: Springer, 644–674
Han G, Li H, Qin B D, et al. Chameleon all-but-one extractable hash proof and its applications. Sci China Inf Sci, 2018, 61: 099103
Zhang J, Yu Y. Two-round pake from approximate SPH and instantiations from lattices. In: Advances in Cryptology-ASIACRYPT 2017. Berlin: Springer, 2017. 37–67
Kim S, Wu D J. Multi-theorem preprocessing NIZKs from lattices. In: Advances in Cryptology-CRYPTO 2018. Berlin: Springer, 2018. 733–765
Peikert C. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Proceedings of the Annual ACM Symposium on Theory of Computing, Bethesda, 2009. 333–342
Wee H. Public key encryption against related key attacks. In: Public Key Cryptography-PKC 2012. Berlin: Springer, 2012. 262–279
Steinfeld R, Ling S, Pieprzyk J, et al. NTRUCCA: how to strengthen ntruencrypt to chosen-ciphertext security in the standard model. In: Public Key Cryptography-PKC 2012. Berlin: Springer, 2012. 353–371
Dowsley R, Hanaoka G, Imai H, et al. Reducing the ciphertext size of Dolev-Dwork-Naor like public key cryptosystems. Cryptology ePrint Archive, Report 2009/271, 2009
Agrawal S, Boneh D, Boyen X. Efficient lattice (H)IBE in the standard model. In: Advances in Cryptology-EUROCRYPT 2010. Berlin: Springer, 2010. 553–572
Agrawal S, Boneh D, Boyen X. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: Advances in Cryptology-CRYPTO 2010. Berlin: Springer, 2010. 98–115
Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees, or how to delegate a lattice basis. In: Advances in Cryptology-EUROCRYPT 2010. Berlin: Springer, 2010. 523–552
Yamada S. Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters. In: Advances in Cryptology-EUROCRYPT 2016. Berlin: Springer, 2016. 32–62
Zhang J, Chen Y, Zhang Z. Programmable hash functions from lattices: short signatures and IBEs with small key sizes. In: Advances in Cryptology-CRYPTO 2016. Berlin: Springer, 2016. 303–332
Yamada S. Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques. In: Advances in Cryptology-CRYPTO 2017. Berlin: Springer, 2017. 161–193
Dottling N, Garg S, Hajiabadi M, et al. New constructions of identity-based and key-dependent message secure encryption schemes. In: Public-Key Cryptography-PKC 2018. Berlin: Springer, 2018. 3–31
Micciancio D, Peikert C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In: Advances in Cryptology-EUROCRYPT 2012. Berlin: Springer, 2012. 700–718
Canetti R, Halevi S, Katz J. Chosen-ciphertext security from identity-based encryption. In: Proceedings of EUROCRYPT 2004. Berlin: Springer, 2004. 207–222
Boneh D, Katz J. Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Topics in Cryptology-CT-RSA 2005. Berlin: Springer, 2005. 87–103
Lyubashevsky V, Micciancio D. Asymptotically efficient lattice-based digital signatures. J Cryptol, 2018, 31: 774–797
Albrecht M R, Player R, Scott S. On the concrete hardness of learning with errors. J Math Cryptol, 2015, 9: 169–203
Ajtai M. Generating hard instances of the short basis problem. In: Automata, Languages and Programming. Berlin: Springer, 1999. 706
Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, 2008. 197–206
Regev O. On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing. New York: ACM, 2005. 84–93
Applebaum B, Cash D, Peikert C, et al. Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Advances in Cryptology-CRYPTO 2009. Berlin: Springer, 2009. 595–618
Lindner R, Peikert C. Better key sizes (and attacks) for LWE-based encryption. In: Topics in Cryptology-CT-RSA 2011. Berlin: Springer, 2011. 6558: 319–339
Bos J, Costello C, Ducas L, et al. Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016. 1006–1018
Stehle D, Steinfeld R, Tanaka K, et al. Efficient public key encryption based on ideal lattices. In: Advances in Cryptology — ASIACRYPT 2009. Berlin: Springer, 2009. 617–635
Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. In: Advances in Cryptology-EUROCRYPT 2010. Berlin: Springer, 2010. 1–23
Stehle D, Steinfeld R. Making NTRU as secure as worst-case problems over ideal lattices. In: Advances in Cryptology-EUROCRYPT 2011. Berlin: Springer, 2011. 27–47
Alkim E, Ducas L, Pöppelmann T, et al. Post-quantum key exchange-a new hope. In: Proceedings of the 25th USENIX Security Symposium, Austin, 2016
Alkim E, Ducas L, Poöppelmann T, et al. Newhope Without Reconciliation. Cryptology ePrint Archive, Report 2016/1157, 2016
Boneh D, Dagdelen Ö, Fischlin M, et al. Random oracles in a quantum world. In: Advances in Cryptology-ASIACRYPT 2011. Berlin: Springer, 2011. 41–69
Jiang H, Zhang Z, Chen L, et al. IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisted. In: Advances in Cryptology — CRYPTO 2018. Berlin: Springer, 2018. 96–125
Saito T, Xagawa K, Yamakawa T. Tightly-secure key-encapsulation mechanism in the quantum random oracle model. In: Advances in Cryptology — EUROCRYPT 2018. Berlin: Springer, 2018. 520–551
Libert B, Sakzad A, Stehle D, et al. All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE. In: Advances in Cryptology — CRYPTO 2017. Berlin: Springer, 2017. 332–364
Banaszczyk W. New bounds in some transference theorems in the geometry of numbers. Math Ann, 1993, 296: 625–635
Peikert C. An efficient and parallel Gaussian sampler for lattices. In: Advances in Cryptology-CRYPTO 2010. Berlin: Springer, 2010. 80–97
Ducas L, Micciancio D. Improved short lattice signatures in the standard model. In: Advances in Cryptology-CRYPTO 2014. Berlin: Springer, 2014. 335–352
Vershynin R. Introduction to the non-asymptotic analysis of random matrices. 2010. ArXiv: 10113027
Peikert C, Regev O, Stephens-Davidowitz N. Pseudorandomness of ring-LWE for any ring and modulus. In: STOC 2017. ACM, 2017. 461–473
Alwen J, Peikert C. Generating shorter bases for hard random lattices. In: Proceedings of STACS, 2009. 75–86
Cramer R, Damgard I. On the amortized complexity of zero-knowledge protocols. In: Proceedings of CRYPTO 2009. Berlin: Springer, 2009. 177–191
Shoup V. Sequences of Games: a Taming Complexity in Security Proofs. Cryptology ePrint Archive, Report 2004/332, 2004
Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (standard) LWE. In: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. Washington: IEEE Computer Society, 2011. 97–106
Acknowledgements
Jiang ZHANG is supported by National Key Research and Development Program of China (Grant Nos. 2017YFB0802005, 2018YFB0804105), National Natural Science Foundation of China (Grant No. 61602046), Young Elite Scientists Sponsorship Program by CAST (Grant No. 2016QNRC001), and Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection (Grant No. 2017B030301004). Yu YU is supported by National Natural Science Foundation of China (Grant Nos. 61872236, 61572192), National Cryptography Development Fund (Grant No. MMJJ20170209), and Anhui Initiative in Quantum Information Technologies (Grant No. AHY150100). Shuqin FAN is supported by National Key Research and Development Program of China (Grant No. 2017YFB0802005). Zhenfeng ZHANG is supported by National Key Research and Development Program of China (Grant No. 2017YFB0802005) and National Natural Science Foundation of China (Grant No. U1536205).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, J., Yu, Y., Fan, S. et al. Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 63, 182101 (2020). https://doi.org/10.1007/s11432-019-9861-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-9861-3