Paper 2015/572
On Public Key Encryption from Noisy Codewords
Eli Ben-Sasson, Iddo Ben-Tov, Ivan Damgard, Yuval Ishai, and Noga ron-Zewi
Abstract
Several well-known public key encryption schemes, including those of Alekhnovich (FOCS 2003), Regev (STOC 2005), and Gentry, Peikert and Vaikuntanathan (STOC 2008), rely on the conjectured intractability of inverting noisy linear encodings. These schemes are limited in that they either require the underlying field to grow with the security parameter, or alternatively they can work over the binary field but have a low noise entropy that gives rise to sub-exponential attacks.
Motivated by the goal of efficient public key cryptography, we study the possibility of obtaining improved security over the binary field by using different noise distributions.
Inspired by an abstract encryption scheme of Micciancio (PKC 2010), we consider an abstract encryption scheme that unifies all the three schemes mentioned above and allows for arbitrary choices of the underlying field and noise distributions.
Our main result establishes an unexpected connection between the power of such encryption schemes and additive combinatorics. Concretely, we show that under the ``approximate duality conjecture" from additive combinatorics (Ben-Sasson and Zewi, STOC 2011), every instance of the abstract encryption scheme over the binary field can be attacked in time
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Contact author(s)
- nogazewi @ gmail com
- History
- 2015-06-17: received
- Short URL
- https://ia.cr/2015/572
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/572, author = {Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi}, title = {On Public Key Encryption from Noisy Codewords}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/572}, year = {2015}, url = {https://eprint.iacr.org/2015/572} }