On Public Key Encryption from Noisy Codewords

被引:2
作者
Ben-Sasson, Eli [1 ]
Ben-Tov, Iddo [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [1 ,3 ]
Ron-Zewi, Noga [4 ,5 ]
机构
[1] Technion, Dept Comp Sci, Haifa, Israel
[2] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
[3] UCLA, Los Angeles, CA USA
[4] Inst Adv Study, Sch Math, Princeton, NJ 08540 USA
[5] Rutgers State Univ, DIMACS, Piscataway, NJ USA
来源
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II | 2016年 / 9615卷
基金
新加坡国家研究基金会; 美国国家科学基金会; 欧洲研究理事会;
关键词
Public key encryption; Noisy codewords; Learning parity with noise; Additive combinatorics; RANDOM LINEAR CODES; PARITY PROBLEM; CRYPTOSYSTEMS;
D O I
10.1007/978-3-662-49387-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
zSeveral well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev (STOC 2005), and Gentry, Peikert and Vaikuntanathan (STOC 2008), rely on the conjectured intractability of inverting noisy linear encodings. These schemes are limited in that they either require the underlying field to grow with the security parameter, or alternatively they can work over the binary field but have a low noise entropy that gives rise to sub-exponential attacks. Motivated by the goal of efficient public key cryptography, we study the possibility of obtaining improved security over the binary field by using different noise distributions. Inspired by an abstract encryption scheme of Micciancio (PKC 2010), we study an abstract encryption scheme that unifies all the three schemes mentioned above and allows for arbitrary choices of the underlying field and noise distributions. Our main result establishes an unexpected connection between the power of such encryption schemes and additive combinatorics. Concretely, we show that under the " approximate duality conjecture" from additive combinatorics (Ben-Sasson and Zewi, STOC 2011), every instance of the abstract encryption scheme over the binary field can be attacked in time 2(O(root n)), where n is the maximum of the ciphertext size and the public key size (and where the latter excludes public randomness used for specifying the code). On the flip side, counter examples to the above conjecture (if false) may lead to candidate public key encryption schemes with improved security guarantees. We also show, using a simple argument that relies on agnostic learning of parities (Kalai, Mansour and Verbin, STOC 2008), that any such encryption scheme can be unconditionally attacked in time 2O((n/log n)), where n is the ciphertext size. Combining this attack with the security proof of Regev's cryptosystem, we immediately obtain an algorithm that solves the learning parity with noise (LPN) problem in time 2O((n/log log n)) using only n(1+C) samples, reproducing the result of Lyubashevsky (Random 2005) in a conceptually different way. Finally, we study the possibility of instantiating the abstract encryption scheme over constant-size rings to yield encryption schemes with no decryption error. We show that over the binary field decryption errors are inherent. On the positive side, building on the construction of matching vector families (Grolmusz, Combinatorica 2000; Efremenko, STOC 2009; Dvir, Gopalan and Yekhanin, FOCS 2010), we suggest plausible candidates for secure instances of the framework over constant-size rings that can offer perfectly correct decryption.
引用
收藏
页码:417 / 446
页数:30
相关论文
共 44 条
[1]
Ajtai M., 1996, P STOC 96 PHILADELPH, P99
[2]
Ajtai M., 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
[3]
MORE ON AVERAGE CASE VS APPROXIMATION COMPLEXITY [J].
Alekhnovich, Michael .
COMPUTATIONAL COMPLEXITY, 2011, 20 (04) :755-786
[4]
[Anonymous], 2009, Post quantum cryptography
[5]
[Anonymous], 2015572 IACR CRYPT E
[6]
[Anonymous], 2008, P 40 ANN ACM S THEOR
[7]
[Anonymous], J ACM IN PRESS
[8]
[Anonymous], ADDITIVE COMBINATORI
[9]
[Anonymous], LONDON MATH SOC LECT
[10]
[Anonymous], P 46 ACM S THEOR COM