An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case

Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has larger ciphertext and public key sizes in comparison to conventional PKE schemes (e.g., those based on RSA). In 2018, Lau and Tan proposed a new rank metric code-based PKE scheme, which has smaller public key and ciphertext sizes compared to other code-based PKE schemes. They also proved that their scheme achieves IND-CPA security, assuming the intractability of the decisional rank syndrome decoding problem. It is known that IND-CCA2 security is the strongest and most popular security assurance for PKE schemes. Therefore, in this paper, we obtain a new code-based PKE scheme from Lau and Tan’s scheme, in order to inherit the underlying small public key and ciphertext sizes. However, our new scheme is shown to achieve IND-CCA2 security, instead of the weaker IND-CPA security. Specifically, the respective public key size and ciphertext size in our new scheme are 15.06 KB and 1.37 KB under 141-bit security level, and 16.76 KB and 1.76 KB under 154-bit security level. We then present a use case for the proposed scheme, that is for secure cloud storage.

[1]  Jong Hyuk Park,et al.  SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook , 2017, Appl. Soft Comput..

[2]  Adrien Hauteville,et al.  Identity-Based Encryption from Codes with Rank Metric , 2017, CRYPTO.

[3]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[4]  Xinwen Zhang,et al.  CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.

[5]  Bharati Mishra,et al.  CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage , 2018, 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT).

[6]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[7]  Pierre Loidreau,et al.  A New Rank Metric Codes Based Encryption Scheme , 2017, PQCrypto.

[8]  Daniel J. Bernstein,et al.  Grover vs. McEliece , 2010, PQCrypto.

[9]  Joachim Rosenthal,et al.  Extension of Overbeck’s attack for Gabidulin-based cryptosystems , 2018, Des. Codes Cryptogr..

[10]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[11]  Chik How Tan,et al.  A New Encryption Scheme Based on Rank Metric Codes , 2018, ACISP.

[12]  Jong Hyuk Park,et al.  XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs , 2017, J. Inf. Process. Syst..

[13]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[14]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[15]  Jong Hyuk Park,et al.  A novel framework for internet of knowledge protection in social networking services , 2018, J. Comput. Sci..

[16]  Ayoub Otmani,et al.  Improved cryptanalysis of rank metric schemes based on Gabidulin codes , 2018, Des. Codes Cryptogr..

[17]  Peter W. Shor Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .

[18]  Yongge Wang,et al.  Quantum resistant random linear code based public key encryption scheme RLCE , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).

[19]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[20]  G. Manoj Someswar,et al.  Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .

[21]  Kazukuni Kobara,et al.  Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.

[22]  Gaikwad Prajakta,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2015 .

[23]  Jin Li,et al.  Verifiable searchable encryption with aggregate keys for data sharing system , 2018, Future Gener. Comput. Syst..

[24]  Mihir Bellare,et al.  Optimal Asymmetric Encryption , 1994, EUROCRYPT.

[25]  Alberto Ravagnani,et al.  Weight distribution of rank-metric codes , 2015, Designs, Codes and Cryptography.

[26]  Daniel J. Bernstein,et al.  Introduction to post-quantum cryptography , 2009 .