Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme

Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We show how to build distributed key generation and distributed decryption procedures for the Ring-LWE based post-quantum cryptosystem. Our protocols implement the CCA variants of distributed decryption and are actively secure (with abort) in the case of three parties and honest majority. Our protocols make use of a combination of problem specific MPC protocols, generic garbled circuit based MPC and generic Linear Secret Sharing based MPC. We also, as a by-product, report on the first run-times for the execution of the SHA-3 function in an MPC system.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings
EditorsJulian Jang-Jaccard, Fuchun Guo
PublisherSpringer Verlag
Pages192-210
Number of pages19
ISBN (Print)9783030215477
DOIs
StatePublished - 2019
Event24th Australasian Conference on Information Security and Privacy, ACISP 2019 - Christchurch, New Zealand
Duration: 3 Jul 20195 Jul 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11547 LNCS

Conference

Conference24th Australasian Conference on Information Security and Privacy, ACISP 2019
Country/TerritoryNew Zealand
CityChristchurch
Period3/07/195/07/19

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme'. Together they form a unique fingerprint.

Cite this