Yusuke Yoshida with Kirill Morozov and Keisuke Tanaka
from Tokyo Institute of Technology, Japan
1
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model - - PowerPoint PPT Presentation
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model Yusuke Yoshida with Kirill Morozov and Keisuke Tanaka from Tokyo Institute of Technology, Japan 1 Contents Contents Key-Privacy for PKE Indistinguishability of keys (IK) 2
from Tokyo Institute of Technology, Japan
1
2
3
4
5
6
7
*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key
8
*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key
sender
true receiver
9
*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key
10
*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key
11
12
13
14
15
*.
16
*.
*| 𝑦 ∈ 𝔾) 1 for a generator matrix 𝐻.
17
*.
*| 𝑦 ∈ 𝔾) 1 for a generator matrix 𝐻.
*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.
18
*.
*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.
19
*.
*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.
20
21
*Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996.
22
*Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996.
23
*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)
24
*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)
*, 𝑥𝑢 𝑛 ≤ 𝑢.
25
*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)
*, 𝑥𝑢 𝑛 ≤ 𝑢.
26
*Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Crypt. 49(1–3), 289–305 (2008)
*, 𝑥𝑢 𝑛||𝑠 ≤ 𝑢.
27
*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key
28
*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key
29
*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key
†Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. ‡Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013.
30
*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key
†Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. ‡Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013.
31
32
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009.
Hard core predicate One-time signature
33
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009.
Hard core predicate One-time signature
34
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
Hard core predicate One-time signature
Random padding One-time signature
35
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
Hard core predicate One-time signature
Random padding One-time signature
36
Hard core predicate One-time signature
Random padding One-time signature
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
37
38
Hard core predicate One-time signature
Random padding One-time signature
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
39
Hard core predicate One-time signature
Random padding One-time signature
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
40
Hard core predicate One-time signature
Random padding One-time signature
*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)
41
Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 Secret key s𝑙 = 𝑇, 𝐼<, 𝑄
42
<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙
43
<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙
44
<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙
45
< , 𝑄L,` , 1 ≤ 𝑗 ≤ 𝑙
46
47
48
49
50
51
52
53
54
55
Random padding One-time signature
56
Random padding One-time signature
57
? ? ? ? ? ? ? ? Open Question ? ? ? ? ? ? ? ? ? More efficient scheme ? ? ? ? ? in the standard model? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
58