Three’s compromised too: Circular insecurity for any cycle length from (Ring-)LWE

11Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A public-key encryption scheme is k-circular secure if a cycle of k encrypted secret keys (Encpk1(sk2), Encpk2(sk3),., Encpkk(sk1)) is indistinguishable from encryptions of zeros. Circular security has applications in a wide variety of settings, ranging from security of symbolic protocols to fully homomorphic encryption. A fundamental question is whether standard security notions like IND-CPA/CCA imply k-circular security. For the case k = 2, several works over the past years have constructed counterexamples—i.e., schemes that are CPA or even CCA secure but not 2-circular secure—under a variety of well-studied assumptions (SXDH, decision linear, and LWE). However, for k > 2 the only known counterexamples are based on strong general-purpose obfuscation assumptions. In this work we construct k-circular security counterexamples for any k ≥ 2 based on (ring-)LWE. Specifically: -for any constant k = O(1), we construct a counterexample based on n-dimensional (plain) LWE for poly(n) approximation factors; -for any k = poly(λ), we construct one based on degree-n ring-LWE for at most subexponential exp(nε) factors. Moreover, both schemes are k′-circular insecure for 2 ≤ k′≤ k. Notably, our ring-LWE construction does not immediately translate to an LWE-based one, because matrix multiplication is not commutative. To overcome this, we introduce a new “tensored” variant of LWE which provides the desired commutativity, and which we prove is actually equivalent to plain LWE.

Cite

CITATION STYLE

APA

Alamati, N., & Peikert, C. (2016). Three’s compromised too: Circular insecurity for any cycle length from (Ring-)LWE. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9815, pp. 659–680). Springer Verlag. https://doi.org/10.1007/978-3-662-53008-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free