Back to Search Start Over

Verifiable Decryption in the Head

Authors :
Kristian Gjøsteen
Thomas Haines
Johannes Müller
Peter Rønne
Tjerand Silde
Norwegian University of Science and Technology (NTNU)
Australian National University (ANU)
University of Luxembourg [Luxembourg]
Proof techniques for security protocols (PESTO)
Inria Nancy - Grand Est
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM)
Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA)
Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA)
Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
ANR-22-PECY-0006,SVP,Verification of Security Protocols(2022)
Source :
Lecture Notes in Computer Science, Australasian Conference on Information Security and Privacy, Australasian Conference on Information Security and Privacy, Nov 2022, Wollongong, Australia. pp.355-374, ⟨10.1007/978-3-031-22301-3_18⟩, Information Security and Privacy ISBN: 9783031223006
Publication Year :
2022
Publisher :
HAL CCSD, 2022.

Abstract

International audience; In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple verifiable decryption scheme for lattice-based cryptography, especially for large sets of ciphertexts; it has small size and lightweight computations as we reduce the need of zero-knowledge proofs for each ciphertext. We believe the flexibility of the general technique is interesting and provides attractive trade-offs between complexity and security, in particular for the interactive variant with smaller soundness. Finally, the protocol requires only very simple operations, making it easy to correctly and securely implement in practice. We suggest concrete parameters for our protocol and give a proof of concept implementation, showing that it is highly practical.

Details

Language :
English
ISBN :
978-3-031-22300-6
ISBNs :
9783031223006
Database :
OpenAIRE
Journal :
Lecture Notes in Computer Science, Australasian Conference on Information Security and Privacy, Australasian Conference on Information Security and Privacy, Nov 2022, Wollongong, Australia. pp.355-374, ⟨10.1007/978-3-031-22301-3_18⟩, Information Security and Privacy ISBN: 9783031223006
Accession number :
edsair.doi.dedup.....e10c58814eec69e82d2703fb5083b12c
Full Text :
https://doi.org/10.1007/978-3-031-22301-3_18⟩