• 首页 首页 icon
  • 工具库 工具库 icon
    • IP查询 IP查询 icon
  • 内容库 内容库 icon
    • 快讯库 快讯库 icon
    • 精品库 精品库 icon
    • 问答库 问答库 icon
  • 更多 更多 icon
    • 服务条款 服务条款 icon

Efficient Laconic Cryptography from Learning With Errors

武飞扬头像
qq5f2bca2ab6e17
帮助2

Abstract. Laconic cryptography is an emerging paradigm that enables cryptographic primitives with

sublinear communication complexity in just two messages. In particular, a two-message protocol between Alice and Bob is called laconic if its communication and computation complexity are essentially

independent of the size of Alice’s input. This can be thought of as a dual notion of fully-homomorphic

encryption, as it enables “Bob-optimized” protocols. This paradigm has led to tremendous progress in

recent years. However, all existing constructions of laconic primitives are considered only of theoretical

interest: They all rely on non-black-box cryptographic techniques, which are highly impractical.

This work shows that non-black-box techniques are not necessary for basic laconic cryptography primitives. We propose a completely algebraic construction of laconic encryption, a notion that we introduce

in this work, which serves as the cornerstone of our framework. We prove that the scheme is secure

under the standard Learning With Errors assumption (with polynomial modulus-to-noise ratio). We

provide proof-of-concept implementations for the first time for laconic primitives, demonstrating the

construction is indeed practical: For a database size of 2

50, encryption and decryption are in the order

of single digit milliseconds.

Laconic encryption can be used as a black box to construct other laconic primitives. Specifically, we

show how to construct:

– Laconic oblivious transfer

– Registration-based encryption scheme

– Laconic private-set intersection protocol

All of the above have essentially optimal parameters and similar practical efficiency. Furthermore, our

laconic encryption can be preprocessed such that the online encryption step is entirely combinatorial

and therefore much more efficient. Using similar techniques, we also obtain identity-based encryption

with an unbounded identity space and tight security proof (in the standard model).

这篇好文章是转载于:学新通技术网

  • 版权申明: 本站部分内容来自互联网,仅供学习及演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,请提供相关证据及您的身份证明,我们将在收到邮件后48小时内删除。
  • 本站站名: 学新通技术网
  • 本文地址: /boutique/detail/tanhigagge
系列文章
更多 icon
同类精品
更多 icon
继续加载