Back to Search
Start Over
Lossy Algebraic Filters With Short Tags
- Source :
- PKC 2019-22nd International Conference on Practice and Theory of Public Key Cryptography, PKC 2019-22nd International Conference on Practice and Theory of Public Key Cryptography, Apr 2019, Beijing, China. pp.34--65, ⟨10.1007/978-3-030-17253-4_2⟩, Public-Key Cryptography – PKC 2019 ISBN: 9783030172527, Public Key Cryptography (1)
- Publication Year :
- 2019
- Publisher :
- HAL CCSD, 2019.
-
Abstract
- International audience; Lossy algebraic filters (LAFs) are function families where each function is parametrized by a tag, which determines if the function is injective or lossy. While initially introduced by Hofheinz (Eurocrypt 2013) as a technical tool to build encryption schemes with key-dependent message chosen-ciphertext (KDM-CCA) security, they also find applications in the design of robustly reusable fuzzy extractors. So far, the only known LAF family requires tags comprised of $\Theta(n^2)$ group elements for functions with input space $Z_p^n$, where $p$ is the group order. In this paper, we describe a new LAF family where the tag size is only linear in n and prove it secure under simple assumptions in asymmetric bilinear groups. Our construction can be used as a drop-in replacement in all applications of the initial LAF system. In particular, it can shorten the ciphertexts of Hofheinz's KDM-CCA-secure public-key encryption scheme by 19 group elements. It also allows substantial space improvements in a recent fuzzy extractor proposed by Wen and Liu (Asiacrypt 2018). As a second contribution , we show how to modify our scheme so as to prove it (almost) tightly secure, meaning that security reductions are not affected by a concrete security loss proportional to the number of adversarial queries.
- Subjects :
- Discrete mathematics
050101 languages & linguistics
business.industry
Computer science
Group (mathematics)
05 social sciences
02 engineering and technology
Function (mathematics)
Lossy compression
Encryption
Injective function
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
tight security
Simple (abstract algebra)
efficiency
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
0501 psychology and cognitive sciences
Concrete security
Lossy algebraic filters
Algebraic number
business
standard assumptions
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-030-17252-7
- ISBNs :
- 9783030172527
- Database :
- OpenAIRE
- Journal :
- PKC 2019-22nd International Conference on Practice and Theory of Public Key Cryptography, PKC 2019-22nd International Conference on Practice and Theory of Public Key Cryptography, Apr 2019, Beijing, China. pp.34--65, ⟨10.1007/978-3-030-17253-4_2⟩, Public-Key Cryptography – PKC 2019 ISBN: 9783030172527, Public Key Cryptography (1)
- Accession number :
- edsair.doi.dedup.....e58f8f6829f1142372417d41b44dfa0c
- Full Text :
- https://doi.org/10.1007/978-3-030-17253-4_2⟩