CTJV801 A Practical Public Key Encryption Scheme Based On Learning Parity With Noise
CTJV801 A Practical Public Key Encryption Scheme Based On Learning Parity With Noise
CTJV801 A Practical Public Key Encryption Scheme Based On Learning Parity With Noise
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
This work was financially supported by the National Natural Science Foundation of China (Grant
Nos. 61672270, 61602216, 61702236), the Changzhou Applied Basic Research Guidance Project
(2016365), the Changzhou Science and Technology Program (CJ20179027) and the State Key
Laboratory of Cryptology, China.
Abstract To protect cyber security and privacy, it is critical to design security and practical public key
encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities
but also fundamental security challenges. Big data faces many security risks in the collection, storage
and use of data and brings serious problems regarding the disclosure of private user data. It is
challenging to achieve security and privacy protection in the big data environment. Thus, to meet the
growing demand of public key encryption in this environment, we proposed a single-bit public key
encryption scheme based on a variant of LPN (Learning Parity with Noise) and extended it to a
multi-bit public key encryption scheme. We proved the correctness and CPA (Chosen Plaintext Attack)
security of the proposed method. Our schemes solved encoding error rate problems of the existing
public key schemes based on LPN, and the encoding error rate in our schemes is negligible.
INDEX TERMS CPA, Encoding error ratio, Encryption, LPN, Public key encryption
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
(Learning parity with noise) problem. An instead of a constant defined in a standard LPN
problem. Subsequently, Damgård et al.
attacker can get a sample set (a, a, s e) ,
proposed not only a public key encryption
where e Ber . Ber represents the scheme based on decisional LPN problem but
Bernoulli distribution that is discrete 0, 1 also a public-key encryption scheme based on a
probability distribution, and the probability of ring-LPN problem [38]. Damgård et al. proved
an occurrence of 1 is 0 1 . The parameter the security of these schemes. Meanwhile, these
in the standard LPN problem is 0 0.5 , schemes are practical. Damgård et al. compared
which is essentially the noise rate. On this basis, some practical public key encryption algorithms
if the attacker is able to distinguish between the such as RSA for computational efficiency,
sampling element and the random element public key size and ciphertext. Although the
RSA algorithm does not have an anti-quantum
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
1 4 1 2 . Meanwhile, Damgård chose a paper and present the definition of the LPN
5
10
problem [39].
condition. Obviously, if is too small, the We will completely work in the field GF2 .
attacker will crack the scheme easily. For a vector u k2 ,the i -th entry of column
Our contributions include the following:
Firstly, we reduce the DLPN variety problem vector u will be denoted by ui . The i -th
column vector of matrix U will be denoted
with S Bernn to the normal DLPN by ui . x D means that x is drawn from
problem. So, our schemes are under the normal distribution D . Assuming A be n order
DLPN assumption. Secondly, we construct a matrix, A denotes the transpose of A and
new single-bit public key encryption algorithm A 1 denotes the inverse matrix of A . A
in which a plaintext bit will be converted to a probability (n) is said to be negligible if
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
(n) 1 p(n) for an arbitrarily large enough III. Public Key Encryption Scheme Based on
integer n . A Bernoulli distribution with DLPN
In this section, we first give a single-bit public
parameter will be denoted by Ber . Berk
key encryption scheme based DLPN, and then
we prove the correctness and security of the
denotes the distribution of vectors a k2
scheme. Second, we extend a single-bit
where each entry of the vector is drawn scheme to the multi-bit public key encryption
scheme and prove its correctness and security.
independently from Ber . Binn , denotes the
binomial distribution with n trials, each with A. Single-Bit Public Key Encryption Scheme
that X is drawn from distribution Binn , . includes three PPT algorithms (KeyGen, Enc,
Dec) following these steps:
(1) The key generation algorithm
For a vector a k2 , its hamming weight is
KeyGen( 1 , ) takes as input an integer n
n
(1 / n ) and randomly selected matrix takes as input the public key pk and message
m Z2 . Compute
A n2n , S n2 n . An attacker can obtain a c1 = rT A e1T ,c 2 = rT B eT2 m . It returns a
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
1 (1 2 )
2 n
. Lastly, because eT2 Bern , h(rT E e1T S eT2 ) when the plaintext m 0 .
2 2
we can reach the following conclusions:
TABLE I
Mathematical expectation of h(d) when m 0 .
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
generality, if we assume A11 n2 n , then (R, rT R eT ) and (S, r T S eT ) , where
DLPN problem.
and noise rate . Choose matrix A n2n
Theorem 6 (Security). Under the DLPN
assumption, the single-bit public key scheme is
randomly and choose S Bern n ,
secure against a chosen plaintext attack.
Proof: Suppose the single-bit public key
E Bern n . Compute B = AS + E . It returns
scheme defined in section 3.1.1 has parameters
n, and public key pk ( A, B) . Let a public key pk ( A, B) and private key
sk = (S) .
ai , j 1 i n,1 j n
R n22 n be ri , j . (2) The encryption algorithm Enc( pk , m )
bi , j 1 i n, n j 2n
takes as input the public key pk and message
Obviously, R has the same distribution as
m n2 . First, convert m to a square matrix
pk ( A, B) .
If plaintext is m 0 , the ciphertext is
M n2 n , if mi 0 , each entry of the i th
r T
A e1T ,rT B eT2 , which can be written as
column of M are 0, and vice versa, each
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
2 2
and E Bern 2 n . (S, R S E ) and
When each entry of the column vector m i is
(S, R ) can also not be distinguished, in
zero, the hamming weight h(di ) is at most
inverse operation on eT2i ; if the plaintext is 0, simply makes a negated operation to (e2 ) i T .
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
Scheme Size of public key (bit) Size of ciphertext (bit) Encoding error
We compare the performance of our RSA and the decryption in our scheme is faster
multi-bit scheme with RSA(not padding) and than in RSA. We get the opposite result when
Damgård’s scheme in implementation for compared with Damgård’s multi-bit scheme.
various security levels as shown in Table 3. The limitation of our approach is that it
The implementation was written in C++ and does not meet the stronger CCA security.
made use of the NTL library for some Overcoming this shortcoming is one of our
mathematical operations. We can see that the future research directions.
encryption in our scheme is slower than in
TABLE III
COMPARISON WITH DAMGÅRD SCHEME AND RSA PUBLIC KEY ENCRYPTION SCHEME
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
designing public key cryptography that Separation of MIMO FIR Mixtures,” IEEE Access, no.99,
satisfies CCA security is also one of our future pp. 1-1. 2017.
Computer Applications, Vol.107, pp.113-124, 2018. Security under Selective Opening Attacks,” Information
Sciences, vol.412–413, pp. 223–241, 2017.
[3] Zheli Liu, Yanyu Huang, Jin Li, Xiaochun Cheng, and
[14]Qun Lin, Hongyang Yan, Zhengan Huang, Wenbin
Chao Shen, "DivORAM: Towards a Practical Oblivious
Chen, Jian Shen, Yi Tang. An ID-based linearly
RAM with Variable Block Size", Information Sciences,
homomorphic signature scheme and its application in
447: 1-11, 2018.
blockchain. IEEE Access. DOI :
[4] Tong Li, Jin Li, Zheli Liu, Ping Li, and Chunfu Jia, 10.1109/ACCESS.2018.2809426.[15] Dan Boneh, Alice
"Differentially Private Naive Bayes Learning over Silverberg, “Applications of multilinear forms to
Multiple Data Sources", Information Sciences, 444: cryptography,” Journal of the Contemporary Mathematics,
89-104, 2018. vol. 324, pp. 71-90, 2003.
[5] Chong-zhi Gao, Qiong Cheng, Pei He, Willy Susilo, [16] Sanjam Garg, Craig Gentry, and Shai Halevi,
“Candidate multilinear maps from ideal lattices,” Lecture
and Jin Li, "Privacy-Preserving Naive Bayes Classifiers
Notes in Computer Science, vol. 7881, pp. 1-17), 2013.
Secure against the Substitution-then-Comparison Attack",
[17] Jean-Sébastien Coron, Tancrède Lepoint, and Mehdi
Information Sciences, 444: 72-88, 2018.
Tibouchi, “Practical multilinear maps over the integers,”
[6] Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia,
Lecture Notes in Computer Science, vol. 8042, pp.
Wenjing Lou, “Identity-based Encryption with Outsourced 476-493, 2013.
Revocation in Cloud Computing, ” IEEE Transactions on [18] Susan Hohenberger, Amit Sahai, and Brent Waters,
Computers, vol. 64, no. 2, pp. 425-437, 2015. “Full domain hash from (leveled) multilinear maps and
[7] Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi identity-based aggregate signatures,” Cryptology ePrint
Gao, Siu-Ming Yiu, Kai Chen, “Multi-key Archive, http://eprint.iacr.org/2013/434.pdf, July 10,
2013.
privacy-preserving deep learning in cloud computing, ”
[19] Yupu Hu and Huiwen Jia, “Cryptanalysis of GGH
Future Generation Computer Systems, vol. 74, pp. 76-85,
Map,” Cryptology ePrint Archive,
2017.
http://eprint.iacr.org/2015/301.pdf, Feb 19, 2016.
[8] Applebaum, B., Cash, D., Peikert, C., Sahai, A., “Fast
[20] O. Regev, “On lattices, learning with errors, random
cryptographic primitives and circular-secure encryption linear codes, and cryptography,” Journal of the ACM, vol.
based on hard learning problems,” Lecture Notes in 56, no.6, pp.1-40, 2009.
Computer Science, vol. 5677, pp. 595-618, 2009. [21] Gentry, C., Peikert, C., Vaikuntanathan, V.,
[9] G. Liu, H. Li, L. Yang, “A Topology Preserving “Trapdoors for hard lattices and new cryptographic
Method of Evolving Contours Based on Sparsity constructions,” Journal of the Electronic Colloquium on
Constraint for Object Segmentation, ” IEEE Access, vol. 5, Computational Complexity, vol. 2008, no.14, pp.197-206,
no.99, pp. 19971-19982, 2017. 2008.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
[22] Brakerski, Z., Vaikuntanathan, V., “Efficient fully [35] Jonathan Katz, Ji Sun Shin, and Adam Smith,
homomorphic encryption from (standard) LWE,” IEEE “Parallel and Concurrent Security of the HB and HB+
Symposium on Foundations of Computer Science, vol. 54, Protocols,” Journal of the Cryptology, vol. 23, pp. 402-421,
no.2, pp.97-106, 2011. 2010.
[23] Jin Li, Yatkit Li, Xiaofeng Chen, Patrick Lee, [36] Benny Applebaum et al., “Fast Cryptographic
Wenjing Lou. A Hybrid Cloud Approach for Secure Primitives and Circular-Secure Encryption Based on Hard
Authorized Deduplication. IEEE Transactions on Parallel Learning Problems,” Lecture Notes in Computer Science,
and Distributed Systems. 26(5), pp. 1206-1216. 2015.
vol. 5677, pp. 595-618, 2009.
[24] Cabarcas, D., Göpfert, F., Weiden, P., “Provably [37] Michael Alekhnovich, “More on Average Case vs
secure LWE encryption with smallish uniform noise and Approximation Complexity,” IEEE Symposium on
secret,” Journal of the ACM, vol. 2014, pp.33-42, 2014. Foundations of Computer Science, vol.20, no.4, pp.
[25] Wenbin Chen, Hao Lei, Ke Qi. Lattice-Based 755-786, 2003.
Linearly Homomorphic Signatures in the Standard Model. [38] Ivan Damgård and Sunoo Park, “How Practical is
Theoretical Computer Science, Vol 634. pp:47-54,2016.
Public-Key Encryption Based on LPN and Ring-LPN?,”
[26] Lindner, R., Peikert, C., “Better key sizes (and attacks)
Cryptology ePrint Archive,
for LWE-based encryption,” Lecture Notes in Computer
http://eprint.iacr.org/2012/699.pdf, June 20, 2016.
Science, vol. 6558, pp.319-339, 2011.
[39] Avrim Blum et al., “Cryptographic Primitives Based
[27] Garg S, Gentry C, Halevi S, et al., “Candidate
on Hard Learning Problems,” Lecture Notes in Computer
indistinguishability obfuscation and functional encryption
Science, vol. 773, pp. 278-291, 2001.
for all circuits,” Annual IEEE Symposium on Foundations
of Computer Science, vol.311, no.2, pp.40-49, 2013.
Zhimin Yu was born in
[28] Qun Lin, Jin Li, Zhengan Huang, Wenbin Chen, Jian
Meihekou, China in October
Shen. A short linearly homomorphic proxy signature
1973. He received a B.S. degree
scheme," IEEE Access. Volume: 6: 12966-12972, 2018.
in Computer Engineering from
[29] Avrim Blum, Adam Kalai, and Hal Wasserman,
Tongji University, Shanghai,
“Noise-tolerant learning, the parity problem, and the
China, in 1996 and an M.S.
statistical query model,” Journal of the ACM, vol.50, no.4,
degree in Computer Application
pp. 506-519, 2003.
from Tongji University, Shanghai, China, in 2004. He is
[30] Vadim Lyubashevsky, “The Parity Problem in the
currently a lecturer at School of Computer Engineering of
Presence of Noise, Decoding Random Linear Codes, and
Jiangsu University of Technology in China. His research
the Subset Sum Problem,” Lecture Notes in Computer
interests include cryptology and information security.
Science, vol. 3624, pp.378-389, 2005.
Chong-zhi Gao received his
[31] Paul Kirchner, “Improved Generalized Birthday
Ph.D. (2004) in Applied
Attack,” Cryptology ePrint Archive,
Mathematics from Sun Yat-sen
http://eprint.iacr.org/2011/377.pdf, June 15, 2016.
University. Currently, he is a
[32] Nicholas J. Hopper, Manuel Blum, “Secure Human
professor at the School of
Identification Protocols,” Lecture Notes in Computer
Computer Science of Guangzhou
Science, vol. 2248 , pp.52-66, 2001.
University. His research interests
[33] Ari Juels, Stephen A, “Weis: Authenticating
include cryptography and privacy in machine learning.
Pervasive Devices with Human Protocols,” Lecture Notes
Zhengjun Jing was born in
in Computer Science, vol. 3621, pp. 293-308, 2005.
Danyang, China in October 1978.
[34] Henri Gilbert, Matthew J. B. Robshaw, and Yannick
He received his Ph.D. in
Seurin, “How to Encrypt with the LPN Problem,” Lecture
Information and Security from
Notes in Computer Science, vol. 5126, pp. 679-690, 2008.
Nanjing University of Posts and
10
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2018.2840119, IEEE
Access
11
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.