In this work we study the quantum security of public key encryption schemes (PKE). Boneh and Zhandry (CRYPTO'13) initiated this research area for PKE and symmetric key encryption (SKE), albeit restricted to a classical indistinguishability phase. Gagliardoni et al. (CRYPTO'16) advanced the study of quantum security by giving, for SKE, the first definition with a quantum indistinguishability phase. For PKE, on the other hand, no notion of quantum security with a quantum indistinguishability phase exists. Our main result is a novel quantum security notion (qIND-qCPA) for PKE with a quantum indistinguishability phase, which closes the aforementioned gap. We show a distinguishing attack against code-based schemes and against LWE-based schemes with certain parameters. We also show that the canonical hybrid PKE-SKE encryption construction is qIND-qCPA-secure, even if the underlying PKE scheme by itself is not. Finally, we classify quantum-resistant PKE schemes based on the applicability of our security notion. Our core idea follows the approach of Gagliardoni et al. by using so-called type-2 operators for encrypting the challenge message. At first glance, type-2 operators appear unnatural for PKE, as the canonical way of building them requires both the secret and the public key. However, we identify a class of PKE schemes - which we call recoverable - and show that for this class type-2 operators require merely the public key. Moreover, recoverable schemes allow to realise type-2 operators even if they suffer from decryption failures, which in general thwarts the reversibility mandated by type-2 operators. Our work reveals that many real-world quantum-resistant PKE schemes, including most NIST PQC candidates and the canonical hybrid construction, are indeed recoverable.
翻译:在此工作中,我们研究了公用钥匙加密计划的量子安全(PKE) 。 Boneh 和 Zhandry (CRYPTO'13) 启动了PKE 和对称钥匙加密(SKE) 的这个研究领域,尽管仅限于传统的分化阶段。 Gagliardoni 等人(CRYPTO'16) 通过给 SKE 提供具有量子分化阶段的第一个定义, 推进了量子安全研究。 另一方面, PKE 不存在具有量分化阶段的量子安全概念。 我们的主要结果是PKE 和对称密密密密密密密密密密密加密(QQQQTO 13) 的量子安全概念(QIND-QCPA ) 。 最后,我们将QK 类操作员的量级安全性概念概念化(QQK ) 要求完成基于基于代码的系统计划。 我们还表明, PK-K-QQO 网络的精密混合组合(如果PK-ch-ch) 也能够通过我们的常规的系统系统来恢复。