**Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing**

*Baodong Qin and Shengli Liu*

**Abstract: **In AsiaCrypt~2013, Qin and Liu proposed a new approach to CCA-security of Public-Key Encryption (PKE) in the presence of bounded key-leakage, from any universal hash proof system (due to Cramer and Shoup) and any one-time lossy filter (a simplified version of lossy algebraic filters, due to Hofheinz). They presented two instantiations under the DDH and DCR assumptions, which result in leakage rate (defined as the ratio of leakage amount to the secret-key length) of $1/2-o(1)$. In this paper, we extend their work to broader assumptions and to flexible leakage rate, more specifically to leakage rate of $1-o(1)$.
\begin{itemize}
\item We introduce the Refined Subgroup Indistinguishability (RSI) assumption, which is a subclass of subgroup indistinguishability assumptions, including many standard number-theoretical assumptions, like the quadratic residuosity assumption, the decisional composite residuosity assumption and the subgroup decision assumption over a group of known order defined by Boneh et al.
\item We show that universal hash proof (UHP) system and one-time lossy filter (OT-LF) can be simply and efficiently constructed from the RSI assumption. Applying Qin and Liu's paradigm gives simple and efficient PKE schemes under the RSI assumption.
\item With the RSI assumption over a specific group (free of pairing), public parameters of UHP and OT-LF can be chosen in a flexible way, resulting in a leakage-flexible CCA-secure PKE scheme. More specifically, we get the first CCA-secure PKE with leakage rate of $1-o(1)$ without pairing.
\end{itemize}

**Category / Keywords: **public-key cryptography / Public-key encryption, leakage flexibility, chosen-ciphertext security

**Original Publication**** (in the same form): **IACR-PKC-2014
**DOI: **10.1007/978-3-642-54631-0_2

**Date: **received 23 Mar 2015

**Contact author: **qinbaodong at sjtu edu cn, slliu@sjtu edu cn

**Available format(s): **PDF | BibTeX Citation

**Version: **20150325:124120 (All versions of this report)

**Short URL: **ia.cr/2015/272

[ Cryptology ePrint archive ]