Paper 2022/937

Post-quantum Plaintext-awareness

Ehsan Ebrahimi, University of Luxembourg
Jeroen van Wier, University of Luxembourg
Abstract

In this paper, we formalize the plaintext-awareness notion in the superposition access model in which a quantum adversary may implement the encryption oracle in a quantum device and make superposition queries to the decryption oracle. Due to various possible ways an adversary can access the decryption oracles, we present six security definitions to capture the plaintext-awareness notion with respect to each way of access. We study the relationships between these definitions and present various implications and non-implications. Classically, the strongest plaintext-awareness notion (PA2) accompanied by the indistinguishability under chosen-plaintext attack (IND-CPA) notion yields the indistinguishability under chosen-ciphertext attack (INDCCA) notion. We show that the PA2 notion is not sufficient to show the above relation when targeting the IND-qCCA notion (Boneh-Zhandry definition, Crypto 2013). However, our proposed post-quantum PA2 notion with superposition decryption queries fulfils this implication.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. PQCrypto2022
Keywords
Plaintext-awareness Post-quantum Security Public-key Encryption
Contact author(s)
ehsan ebrahimi @ uni lu
jeroen vanwier @ uni lu
History
2022-07-20: approved
2022-07-19: received
See all versions
Short URL
https://ia.cr/2022/937
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2022/937,
      author = {Ehsan Ebrahimi and Jeroen van Wier},
      title = {Post-quantum Plaintext-awareness},
      howpublished = {Cryptology ePrint Archive, Paper 2022/937},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/937}},
      url = {https://eprint.iacr.org/2022/937}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.