Paper 2024/1977
Bounded CCA2 Secure Proxy Re-encryption Based on Kyber
Abstract
Proxy re-encryption (PRE) allows a semi-honest party (called a proxy) to convert ciphertexts under a public key into ciphertexts under another public key. Due to this functionality, there are various applications such as encrypted email forwarding, key escrow, and secure distributed file systems. On the other hand, post-quantum cryptography (PQC) is one of the most important research areas. However, there is no post-quantum PRE scheme with security against adaptive chosen ciphertext attacks (denoted by $\mathsf{CCA}2$ security) while many PRE schemes have been proposed so far. In this paper, we propose a bounded $\mathsf{CCA}2$ secure PRE scheme based on CRYSTALS-Kyber (Kyber, for short) which is a selected algorithm in the NIST PQC competition. To this end, we present generic constructions of bounded $\mathsf{CCA}2$ secure PRE. Our generic constructions start from PRE with (a variant of) security against chosen plaintext attacks (denoted by $\mathsf{CPA}$ security) and a new PRE's property introduced in this paper. In order to instantiate our generic constructions, we present a Kyber-based PRE scheme with the required property. As a result, we can construct a bounded $\mathsf{CCA}2$ secure PRE scheme from Kyber.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Proxy re-encryptionLattice-based cryptographyPost-quantum cryptography
- Contact author(s)
-
sato-shingo-zk @ ynu ac jp
shikata-junji-rb @ ynu ac jp - History
- 2025-02-22: last of 3 revisions
- 2024-12-06: received
- See all versions
- Short URL
- https://ia.cr/2024/1977
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1977, author = {Shingo Sato and Junji Shikata}, title = {Bounded {CCA2} Secure Proxy Re-encryption Based on Kyber}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1977}, year = {2024}, url = {https://eprint.iacr.org/2024/1977} }