A gapless code-based hash proof system based on RQC and its applications

  • Slim Bettaieb
  • , Loïc Bidoux
  • , Olivier Blazy
  • , Yann Connan
  • , Philippe Gaborit

Research output: Contribution to journalArticlepeer-review

Abstract

Cramer and Shoup introduced at Eurocrypt’02 the concept of hash proof system, also designated as smooth projective hash functions. Since then, they have found several applications, from building CCA-2 encryption as they were initially created for, to being at the core of several authenticated key exchange or even allowing witness encryption. In the post-quantum setting, the very few candidates use a language based on ciphertexts to build their hash proof system. This choice seems to inherently introduce a gap, as some elements outside the language could not be distinguish from those in the language. This creates a lawless zone, where an adversary can possibly mount an undetectable attack, particularly problematic when trying to prove security in the UC framework (Canetti in A new paradigm for cryptographic protocols. In: 42nd 980 FOCS. IEEE Computer Society Press, pp. 136–145). We show that this gap could be completely withdrawn using code-based cryptography. Starting from RQC (Aguilar-Melchor et al in Rank quasi-cyclic (RQC)), a candidate selected for the second round of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardization project, we show how to build such a hash proof system from code-based cryptography and present a way, based on a proof of knowledge, to fully negate the gap. We propose two applications of our construction, a witness encryption scheme and a password authenticated key exchange (PAKE).

Original languageEnglish
Pages (from-to)3011-3044
Number of pages34
JournalDesigns, Codes, and Cryptography
Volume90
Issue number12
DOIs
Publication statusPublished - 1 Dec 2022
Externally publishedYes

Keywords

  • Code-based cryptography
  • Hash proof system
  • Password authenticated key exchange
  • RQC
  • Witness encryption

Fingerprint

Dive into the research topics of 'A gapless code-based hash proof system based on RQC and its applications'. Together they form a unique fingerprint.

Cite this