CCA2 Key-Privacy for Code-Based Encryption in the Standard Model - - PowerPoint PPT Presentation

cca2 key privacy for code based encryption in the
SMART_READER_LITE
LIVE PREVIEW

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model - - PowerPoint PPT Presentation

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model Yusuke Yoshida with Kirill Morozov and Keisuke Tanaka from Tokyo Institute of Technology, Japan 1 Contents Contents Key-Privacy for PKE Indistinguishability of keys (IK) 2


slide-1
SLIDE 1

Yusuke Yoshida with Kirill Morozov and Keisuke Tanaka

from Tokyo Institute of Technology, Japan

1

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model

slide-2
SLIDE 2

Contents

2

Contents

Key-Privacy for PKE

Indistinguishability of keys (IK)

slide-3
SLIDE 3

Contents

3

Contents

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

slide-4
SLIDE 4

Contents

4

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Contents

slide-5
SLIDE 5

Contents

5

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Our result: CCA2 Key-Privacy for Code-Based Encryption in the Standard Model

We proved that the k-repetition paradigm instantiated with Niederreiter is IK-CCA2 in the standard model.

Contents

slide-6
SLIDE 6

Contents

6

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Contents

slide-7
SLIDE 7

Key-Privacy (Anonymity) for PKE

Indistinguishability of keys (IK)

  • was proposed by Bellare et al.*

7

*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key

  • encryption. In: Boyd, C. (ed.) ASIACRYPT 2001.
slide-8
SLIDE 8

Key-Privacy (Anonymity) for PKE

Indistinguishability of keys (IK)

  • was proposed by Bellare et al.*
  • means a ciphertext does not leak information about pk.

8

*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key

  • encryption. In: Boyd, C. (ed.) ASIACRYPT 2001.

sender

+

who is the receiver?

?

true receiver

slide-9
SLIDE 9

Key-Privacy (Anonymity) for PKE

Indistinguishability of keys (IK)

  • was proposed by Bellare et al.*
  • means a ciphertext does not leak information about pk.
  • against CPA, CCA2 could be considered.

9

IK-CPA

<

IK-CCA2 IND-CPA

<

IND-CCA2

*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key

  • encryption. In: Boyd, C. (ed.) ASIACRYPT 2001.

cf.)

slide-10
SLIDE 10

Key-Privacy (Anonymity) for PKE

Indistinguishability of keys (IK)

  • was proposed by Bellare et al.*
  • means a ciphertext does not leak information about pk.
  • against CPA, CCA2 could be considered.
  • does not imply / is not implied by IND security.

10

IK-CPA

⇎ ⇎

IK-CCA2 IND-CPA IND-CCA2

*Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key

  • encryption. In: Boyd, C. (ed.) ASIACRYPT 2001.
slide-11
SLIDE 11

Definition of IK-CPA

11

Adversary Challenger

pk0, pk1

pk0,sk0←Gen(1λ) pk1,sk1←Gen(1λ)

slide-12
SLIDE 12

Definition of IK-CPA

12

Adversary Challenger

pk0, pk1 m* c*

b ← {0, 1} c* ←Enc(m*,pkb) pk0,sk0←Gen(1λ) pk1,sk1←Gen(1λ)

slide-13
SLIDE 13

Definition of IK-CPA

13

Adversary Challenger

pk0, pk1 m* c* b’

b ← {0, 1} c* ←Enc(m*,pkb) pk0,sk0←Gen(1λ) pk1,sk1←Gen(1λ)

A PKE is IK-CPA ⇔ |Pr[b = b’] – ½| is negligible

slide-14
SLIDE 14

Definition of IK-CCA2

14

Adversary Challenger

pk0, pk1 m* c* b’

b ← {0, 1} c* ←Enc(m*,pkb) pk0,sk0←Gen(1λ) pk1,sk1←Gen(1λ)

A PKE is IK-CCA2 ⇔ |Pr[b = b’] – ½| is negligible

c≠c*,0/1 m/⊥ c,0/1 m/⊥

m/⊥←Dec(c,sk0/1) m/⊥←Dec(c,sk0/1)

slide-15
SLIDE 15

Contents

15

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Contents

slide-16
SLIDE 16

Linear Codes

A binary 𝑜, 𝑙 linear code 𝒟

is a 𝑙-dimensional subspace of 𝔾)

*.

16

slide-17
SLIDE 17

Linear Codes

A binary 𝑜, 𝑙 linear code 𝒟

is a 𝑙-dimensional subspace of 𝔾)

*.

= 𝑦𝐻 ∈ 𝔾)

*| 𝑦 ∈ 𝔾) 1 for a generator matrix 𝐻.

McEliece encryption.

17

slide-18
SLIDE 18

Linear Codes

A binary 𝑜, 𝑙 linear code 𝒟

is a 𝑙-dimensional subspace of 𝔾)

*.

= 𝑦𝐻 ∈ 𝔾)

*| 𝑦 ∈ 𝔾) 1 for a generator matrix 𝐻.

McEliece encryption. = 𝑦 ∈ 𝔾)

*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.

Niederreiter encryption.

18

slide-19
SLIDE 19

Linear Codes

A binary 𝑜, 𝑙 linear code 𝒟

is a 𝑙-dimensional subspace of 𝔾)

*.

= 𝑦 ∈ 𝔾)

*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.

Niederreiter encryption.

19

slide-20
SLIDE 20

Linear Codes

A binary 𝑜, 𝑙 linear code 𝒟

is a 𝑙-dimensional subspace of 𝔾)

*.

= 𝑦 ∈ 𝔾)

*| 𝐼𝑦3 = 0 for a parity check matrix 𝐼.

Niederreiter encryption. is error-correcting up to Hamming weight 𝑢. ⇔ Can compute 𝑦 from syndrome 𝑡 = 𝐼𝑦3, if 𝑥𝑢 𝑦 ≤ 𝑢.

20

slide-21
SLIDE 21

Syndrome Decoding Problem

21

Syndrome Decoding Problem Given a parity check matrix of random code 𝑆 and a syndrome 𝑡 = 𝑆𝑦3 for a random low-weight error 𝑦. Find 𝑦.

*Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996.

slide-22
SLIDE 22

Syndrome Decoding Problem

If SD problem is hard, the decisional version is also hard*.

22

Syndrome Decoding Problem Given a parity check matrix of random code 𝑆 and a syndrome 𝑡 = 𝑆𝑦3 for a random low-weight error 𝑦. Find 𝑦.

*Fischer, J.-B., Stern, J.: An efficient pseudo-random generator provably as secure as syndrome decoding. In: Maurer, U. (ed.) EUROCRYPT 1996.

Decisional version of SD problem Given (𝑆,u) where u is a uniform random vector

  • r 𝑆, 𝑡 , where s = 𝑆𝑦3 as above.

Decide, which is the case.

slide-23
SLIDE 23

Niederreiter*

23

Key generation 𝐼<: parity check matrix of 𝑢-error correcting code. 𝑇: random non-singular matrix, 𝑄: random permutation matrix Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 (We assume 𝐼 is indistinguishable from random R) Secret key s𝑙 = 𝑇, 𝐼<, 𝑄

*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)

slide-24
SLIDE 24

Niederreiter*

24

*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)

Encryption Plaintext is 𝑛 ∈ 𝔾)

*, 𝑥𝑢 𝑛 ≤ 𝑢.

Ciphertext is 𝑑 = 𝐼𝑛3 Key generation 𝐼<: parity check matrix of 𝑢-error correcting code. 𝑇: random non-singular matrix, 𝑄: random permutation matrix Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 (We assume 𝐼 is indistinguishable from random R) Secret key s𝑙 = 𝑇, 𝐼<, 𝑄

slide-25
SLIDE 25

Niederreiter*

25

*Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Control Inf. Theory-Probl. Upravleniya I Teorii Informatsii 15(2), 159–166 (1986)

Decryption Compute 𝑄CD𝐷𝑝𝑠𝑠𝑓𝑑𝑢 𝑇CD𝑑 = 𝑄CD𝑄𝑛3 = 𝑛3 𝐷𝑝𝑠𝑠𝑓𝑑𝑢 is the error correction algorithm for 𝐼<. Encryption Plaintext is 𝑛 ∈ 𝔾)

*, 𝑥𝑢 𝑛 ≤ 𝑢.

Ciphertext is 𝑑 = 𝐼𝑛3 Key generation 𝐼<: parity check matrix of 𝑢-error correcting code. 𝑇: random non-singular matrix, 𝑄: random permutation matrix Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 (We assume 𝐼 is indistinguishable from random R) Secret key s𝑙 = 𝑇, 𝐼<, 𝑄

slide-26
SLIDE 26

Randomized Niederreiter*

26

*Nojima, R., Imai, H., Kobara, K., Morozov, K.: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Crypt. 49(1–3), 289–305 (2008)

Decryption Compute 𝑄CD𝐷𝑝𝑠𝑠𝑓𝑑𝑢 𝑇CD𝑑 = 𝑄CD𝑄 𝑛||𝑠 3 = 𝑛||𝑠 3 Pick 𝑛 from 𝑛||𝑠 3. Encryption Plaintext is 𝑛, Take a random padding vector r 𝑛||𝑠 ∈ 𝔾)

*, 𝑥𝑢 𝑛||𝑠 ≤ 𝑢.

Ciphertext is 𝑑 = 𝐼(𝑛||𝑠)3 Key generation 𝐼<: parity check matrix of 𝑢-error correcting code. 𝑇: random non-singular matrix, 𝑄: random permutation matrix Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 (We assume 𝐼 is indistinguishable from random R) Secret key s𝑙 = 𝑇, 𝐼<, 𝑄

slide-27
SLIDE 27

Key-Privacy for Code-Based Encryption

Yamakawa et al.* first studied key-privacy for code-based encryption, and show

27

*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key

  • encryption. In: Bozta ̧s, S., Lu, H.-F.F. (eds.) AAECC 2007.

IK-CPA not IK-CPA IK-CCA2 McEliece

slide-28
SLIDE 28

Key-Privacy for Code-Based Encryption

Yamakawa et al.* first studied key-privacy for code-based encryption, and show

28

*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key

  • encryption. In: Bozta ̧s, S., Lu, H.-F.F. (eds.) AAECC 2007.

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece

slide-29
SLIDE 29

Key-Privacy for Code-Based Encryption

Yamakawa et al.* first studied key-privacy for code-based encryption, and show

29

*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key

  • encryption. In: Bozta ̧s, S., Lu, H.-F.F. (eds.) AAECC 2007.

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece Random Oracle

Kobara and Imai’s conversion† Persichetti’s hybrid encryption‡

Standard Model

†Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. ‡Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013.

slide-30
SLIDE 30

Key-Privacy for Code-Based Encryption

Yamakawa et al.* first studied key-privacy for code-based encryption, and show

30

*Yamakawa, S., Cui, Y., Kobara, K., Hagiwara, M., Imai, H.: On the key-privacy issue of McEliece public-key

  • encryption. In: Bozta ̧s, S., Lu, H.-F.F. (eds.) AAECC 2007.

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece Random Oracle

Kobara and Imai’s conversion† Persichetti’s hybrid encryption‡

Standard Model

†Kobara, K., Imai, H.: Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. In: Kim, K. (ed.) PKC 2001. ‡Persichetti, E.: Secure and anonymous hybrid encryption from coding theory. In: Gaborit, P. (ed.) PQCrypto 2013.

IK-CCA2 for code-based encryption in the standard model?

?

slide-31
SLIDE 31

31

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Contents

slide-32
SLIDE 32

32

k-repetition Paradigm

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009.

Rosen and Segev*

One way trapdoor k-wise products

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit

slide-33
SLIDE 33

33

k-repetition Paradigm

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009.

One-way ↓ Indistinguishability k-wise product +

  • ne-time signature

↓ CCA security

Rosen and Segev*

One way trapdoor k-wise products

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit

slide-34
SLIDE 34

34

Code-Based CCA Construction

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

Rosen and Segev* Döttling et al.†

One way trapdoor k-wise products

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-repeated McEliece

Random padding One-time signature

FULL construction SIMPLE construction

slide-35
SLIDE 35

35

Code-Based CCA Construction

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

IND-CCA2 IND-CPA

Rosen and Segev* Döttling et al.†

One way trapdoor k-wise products

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-repeated McEliece

Random padding One-time signature

FULL construction SIMPLE construction

slide-36
SLIDE 36

Rosen and Segev* Döttling et al.†

36

k-wise Niederreiter

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

Code-Based CCA Construction

slide-37
SLIDE 37

Contents

37

CCA2 secure PKE in the standard model

k-repetition paradigm

Key-Privacy for PKE

Indistinguishability of keys (IK)

Code-Based Encryption

Niederreiter

Contents

Our result: CCA2 Key-Privacy for Code-Based Encryption in the Standard Model

We proved that the k-repetition paradigm instantiated with Niederreiter is IK-CCA2 in the standard model.

slide-38
SLIDE 38

Rosen and Segev* Döttling et al.†

38

k-wise Niederreiter

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

Instantiation with Niederreiter and its key-privacy

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

slide-39
SLIDE 39

Rosen and Segev* Döttling et al.†

39

k-wise Niederreiter

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

Instantiation with Niederreiter and its key-privacy

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

IK-CCA2 IK-CPA IK-CCA2

slide-40
SLIDE 40

Rosen and Segev* Döttling et al.†

40

k-wise Niederreiter

Hard core predicate One-time signature

IND-CCA2 PKE for 1-bit k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

Instantiation with Niederreiter and its key-privacy

*Rosen, A., Segev, G.: Chosen-ciphertext security via correlated products. In: Reingold, O. (ed.) TCC 2009. †Döttling, N., Dowsley, R., Muller-Quade, J., Nascimento, A.C.A.: A CCA2 secure variant of the mceliece cryptosystem. IEEE Trans. Inf. Theory 58(10), 6672–6680 (2012)

IK-CCA2 IK-CPA IK-CCA2

slide-41
SLIDE 41

How to prove the FULL construction is IK-CCA2

41

The SIMPLE construction with the Niederreiter/McEliece is IK-CPA The FULL construction with the Niederreiter/McEliece is IK-CCA2 If SIMPLE construction is IK-CPA and signature is secure (OT-sEUF-CMA) then the FULL construction is IK-CCA2

slide-42
SLIDE 42
  • cf. Niederreiter

Public key 𝑞𝑙 = 𝐼 = 𝑇𝐼<𝑄 Secret key s𝑙 = 𝑇, 𝐼<, 𝑄

SIMPLE Construction with Niederreiter

42

Key generation 𝑞𝑙 = 𝐼D, 𝐼), … , 𝐼1 , s𝑙 = 𝑇L, 𝐼L

<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙

slide-43
SLIDE 43

SIMPLE Construction with Niederreiter

43

Key generation 𝑞𝑙 = 𝐼D, 𝐼), … , 𝐼1 , s𝑙 = 𝑇L, 𝐼L

<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙

Encryption Pick a random padding vector 𝑠. 𝑑 = (𝐼D×(𝑛| 𝑠 3, 𝐼)×(𝑛| 𝑠 3,...,𝐼1×(𝑛| 𝑠 3)

  • cf. Randomized Niederreiter

Ciphertext is 𝑑 = 𝐼(𝑛||𝑠)3

slide-44
SLIDE 44

SIMPLE Construction with Niederreiter

44

Key generation 𝑞𝑙 = 𝐼D, 𝐼), … , 𝐼1 , s𝑙 = 𝑇L, 𝐼L

<, 𝑄L , 1 ≤ 𝑗 ≤ 𝑙

Encryption Pick a random padding vector 𝑠. 𝑑 = (𝐼D×(𝑛| 𝑠 3, 𝐼)×(𝑛| 𝑠 3,...,𝐼1×(𝑛| 𝑠 3) Decryption Decrypt all elements in c. Confirm that all decrypted 𝑛||𝑠 are the same.

slide-45
SLIDE 45

FULL Construction with Niederreiter

45

Key generation 𝑞𝑙 = 𝐼D,_, 𝐼),_, … , 𝐼1,_ 𝐼D,D, 𝐼),D, … , 𝐼1,D , s𝑙 = 𝑇L,`, 𝐼L,`

< , 𝑄L,` , 1 ≤ 𝑗 ≤ 𝑙

𝑐 = 0,1

Encryption generate verification/signing key pair of one-time signature 𝑤𝑙 = 𝑤𝑙D ∘ ⋯ ∘ 𝑤𝑙1 ∈ 0,1 1, 𝑒𝑡𝑙 𝑑 = 𝐼D,k1l× 𝑛||𝑠 3, … , 𝐼1,k1m× 𝑛||𝑠 3 , 𝜏 ⟵ 𝑡𝑗𝑕𝑜 𝑒𝑡𝑙, 𝑑

  • utput 𝑤𝑙, 𝑑, 𝜏 .

Decryption Verify the signature 𝜏. Decrypt all elements in c. Confirm that all decrypted 𝑛||𝑠 are the same.

slide-46
SLIDE 46

Key-Privacy for These Construction

46

The SIMPLE construction with the Niederreiter/McEliece is IK-CPA The FULL construction with the Niederreiter/McEliece is IK-CCA2 If SIMPLE construction is IK-CPA and signature is secure (OT-sEUF-CMA) then the FULL construction is IK-CCA2

slide-47
SLIDE 47

Key-Privacy for These Construction

47

The SIMPLE construction with the Niederreiter/McEliece is IK-CPA

slide-48
SLIDE 48

Proof Outline

48

𝑞𝑙_ = 𝐼_,D, 𝐼_,), … , 𝐼_,1 𝑞𝑙D = 𝐼D,D, 𝐼D,), … , 𝐼D,1 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝐼`,D×(𝑛| 𝑠 3 𝐼`,)×(𝑛| 𝑠 3 : 𝐼`,1×(𝑛| 𝑠 3

slide-49
SLIDE 49

Proof Outline

49

𝑞𝑙_ = 𝐼_,D, 𝐼_,), … , 𝐼_,1 𝑞𝑙D = 𝐼D,D, 𝐼D,), … , 𝐼D,1 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝐼`,D×(𝑛| 𝑠 3 𝐼`,)×(𝑛| 𝑠 3 : 𝐼`,1×(𝑛| 𝑠 3 𝑞𝑙_ = 𝑆_,D, 𝑆_,), … , 𝑆_,1 , 𝑞𝑙D = 𝑆D,D, 𝑆D,), … , 𝑆D,1 , 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`,D×(𝑛| 𝑠 3 𝑆`,)×(𝑛| 𝑠 3 : 𝑆`,1×(𝑛| 𝑠 3

the public keys are indistinguishable from random matrices.

slide-50
SLIDE 50

Proof Outline

50

𝑞𝑙_ = 𝑆_,D, 𝑆_,), … , 𝑆_,1 𝑞𝑙D = 𝑆D,D, 𝑆D,), … , 𝑆D,1 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`,D×(𝑛| 𝑠 3 𝑆`,)×(𝑛| 𝑠 3 : 𝑆`,1×(𝑛| 𝑠 3

slide-51
SLIDE 51

Proof Outline

51

𝑞𝑙_ = 𝑆_,D, 𝑆_,), … , 𝑆_,1 𝑞𝑙D = 𝑆D,D, 𝑆D,), … , 𝑆D,1

write them together

𝑞𝑙_ = 𝑆_ 𝑞𝑙D = 𝑆D 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`× 𝑛||𝑠 3 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`,D×(𝑛| 𝑠 3 𝑆`,)×(𝑛| 𝑠 3 : 𝑆`,1×(𝑛| 𝑠 3

slide-52
SLIDE 52

Proof Outline

52

𝑞𝑙_ = 𝑆_ 𝑞𝑙D = 𝑆D 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`× 𝑛||𝑠 3 𝑆`× 𝑛||𝑠 3 = 𝑆s,`×𝑛3 + 𝑆u,`×𝑠3

slide-53
SLIDE 53

Proof Outline

53

𝑞𝑙_ = 𝑆_ 𝑞𝑙D = 𝑆D 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`× 𝑛||𝑠 3 𝑆`× 𝑛||𝑠 3 = 𝑆s,`×𝑛3 + 𝑆u,`×𝑠3 𝑆s,`×𝑛3 + 𝑣

Decisional version of SD

slide-54
SLIDE 54

Proof Outline

54

𝑣

No information about b!

𝑞𝑙_ = 𝑆_ 𝑞𝑙D = 𝑆D 𝐹𝑜𝑑 𝑞𝑙`, 𝑛 = 𝑆`× 𝑛||𝑠 3 𝑆`× 𝑛||𝑠 3 = 𝑆s,`×𝑛3 + 𝑆u,`×𝑠3 𝑆s,`×𝑛3 + 𝑣

Decisional version of SD

slide-55
SLIDE 55

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece Random Oracle

Kobara and Imai’s conversion† Persichetti’s hybrid encryption‡

Standard Model

Conclusion

55

?

slide-56
SLIDE 56

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece Random Oracle

Kobara and Imai’s conversion† Persichetti’s hybrid encryption‡

Standard Model k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

IK-CCA2 IK-CPA

Conclusion

56

slide-57
SLIDE 57

IK-CPA not IK-CPA IK-CCA2 McEliece Randomized McEliece Random Oracle

Kobara and Imai’s conversion† Persichetti’s hybrid encryption‡

Standard Model k-wise Niederreiter

Random padding One-time signature

FULL construction SIMPLE construction

IK-CCA2 IK-CPA

Conclusion

57

? ? ? ? ? ? ? ? Open Question ? ? ? ? ? ? ? ? ? More efficient scheme ? ? ? ? ? in the standard model? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?

slide-58
SLIDE 58

Thank you!

58