Abstract
Recent work at SCN 2020 by Boyen, Izabachène, and Li introduced a lattice-based key-encapsulation mechanism (KEM) that achieves CCA2-security in the standard model without relying on generic transformations. Their proof, however, leaves a few gaps that prevent a fully rigorous security justification. Building on the same design rationale, we revisit that construction and refine it to obtain a more compact and provably secure KEM under the Learning With Errors assumption. Furthermore, we extend this framework to derive an identity-based variant (IBKEM) whose security is established in the same model. The resulting schemes combine conceptual simplicity with improved efficiency and complete proofs of adaptive-ciphertext security.
1. Introduction
Public-key encryption (PKE) remains a cornerstone primitive in modern cryptography. There are two common notions for the security of PKE: security against adaptive chosen-plaintext attacks (CPA) and security against adaptive chosen-ciphertext attacks (CCA). In the CPA security model, an adversary is allowed to adaptively query the encryption of messages chosen by himself, and at the end, he must guess which of the two challenge plaintexts corresponds to a given ciphertext. CCA1 security is a stronger notion in which the adversary can request the decryption of arbitrary ciphertexts before seeing the challenge ciphertext. If the adversary can query the decryption oracle even after receiving the challenge ciphertext, we refer to this as CCA2 security. From a design perspective, achieving CCA2 security is preferable because it captures realistic attack scenarios in which ciphertexts can be modified or replayed.
Recently, Key Encapsulation Mechanisms (KEMs) have been introduced as a modular and efficient alternative to traditional PKE. A KEM is a public-key primitive allowing a sender to securely encapsulate a random session key under the public key of the receiver. The receiver can later decapsulate this ciphertext to recover the same shared key, which can then be used with a symmetric encryption scheme (Data Encapsulation Mechanism, or DEM) to achieve hybrid encryption. The security of a KEM is typically defined under the IND-CCA model, ensuring that the encapsulated key is indistinguishable from random even under adaptive decryption queries.
The motivation for studying Identity-Based KEMs (IB-KEMs) stems from the need to simplify key management in large-scale systems. Traditional public-key infrastructures (PKIs) require certificates to bind identities to public keys, which introduces significant overhead. In contrast, identity-based cryptography allows public keys to be derived directly from user identities, such as email addresses, thus eliminating the need for certificates. When combined with the KEM framework, IB-KEM provides an efficient and modular way to establish shared keys under the identity-based setting while maintaining strong CCA security guarantees.
Following the work of Boyen, Izabachène and Li in [1], several directions have been investigated for building lattice-based public-key or key-encapsulation mechanisms that achieve adaptive-ciphertext security in the standard model. The first uses transformations, such as the BCHK conversion [2], applied to identity-based encryption frameworks. The second relies on lossy-trapdoor functions [3], which are injective for one key distribution but statistically lossy for another, as in [4]. The third incorporates non-interactive zero-knowledge (NIZK) proofs within lattice encryption to certify ciphertext validity, following ideas similar to the Naor–Yung paradigm. However, all of those three approaches have certain drawbacks. The first approach is quite popular but it produces an overhead in the ciphertext because they depend on one-time signature mechanisms to bind tags. The problem with the second approach is that all currently known lossy trapdoor functions from lattices [3,5] require large parameters and rely on strong lattice assumptions. The third approach is not practical. Boyen, Izabachène, and Li then proposed, in [1], a new approach to construct an efficient KEM from lattices without using any generic constructions as the aforementioned three approaches. Their technique is adapted from previous work [6] on CCA2-secure PKE construction in pairings to lattice setting. They start from the tag-based CCA1-secure PKE scheme in [7] and replace the tag in a suitable way to achieve CCA2-security. The proof of security reduces to a special form of the Learning With Errors problem, which they denote as the SISnLWE assumption (see Section 2 for the details). However, the security proof of [1] is not complete. In fact, it missed one case in the proof and it is not clear how to argue the security in this situation. In addition, it is non-trivial to obtain an identity-based KEM (IBKEM) from the construction of Boyen, Izabachène, and Li in [1].
1.1. Contribution
The central goal of this paper is to design an identity-based key-encapsulation mechanism (IBKEM) over lattices that achieves selective chosen-ciphertext (CCA2) security, presented in Section 3. This work builds upon the CCA2-secure KEM construction by Boyen, Izabachène, and Li [1], and integrates it with the strong G-trapdoor technique from [7] to enable efficient private key extraction for identities. However, the proposed approach is not an immediate adaptation of [1], due to a technical issue in its security proof. Specifically, the proof of the KEM in [1] does not cover all possible cases of well-formed ciphertexts submitted to the decapsulation oracle. In particular, one security branch was left unaddressed, which leaves the argument for completeness unclear. To address this, we propose in Section 2 a simple modification to the CCA2-secure KEM of [1]. With this refinement, we provide a complete reduction demonstrating that the new KEM satisfies adaptive-ciphertext security. Building on this foundation, our IBKEM inherits the improved security guarantees, achieving IND-sID-CCA2 protection in the standard model under the hardness assumptions of the SIS and SISnLWE problems.
1.2. Our Approach
Let us recall the construction in [1]. In the KEM from [1], the ciphertext is of the form
where matrices and hash function are public and is a transformation of the session key with noise . Here, is a gadget matrix (see Section 2.3 for the detail) and FRD is a full-rank difference encoding introduced in [8]; readers are referred to the formal definition in Section 2.3. The decapsulation algorithm extracts and recovers session key .
We first attempted to extend the original construction of CCA2-secure KEM in [1] to a CCA2-secure IBKEM. Our first challenge was to find a way to generate a trapdoor for each identity in the decapsulation algorithm. In many IBKEM schemes based on lattices (e.g., [8,9]), the ciphertexts for identities are usually of the form
where is the matrix tied to the identity whose trapdoor is the secret keys for . Note that the trapdoor in [1] is a G-trapdoor [7], not the short vectors or bases of the lattices , as in many works such as [8,10]. Moreover, there was no existing scheme using G-trapdoor extraction. We then come up with a way of extracting G-trapdoor by considering
where are public matrices.
The most difficult challenge was in answering the decapsulation queries without leaking any information in the case of some parts of query tuples that coincide with the challenge . The adversary may request decryptions for . The appearance of identities in queries in IBKEM yields more cases to deal with than in KEM. Therefore, we failed to use the original KEM construction of Boyen [1] to extend to IBKEM, which motivated us to revise it.
In the IND-CCA2 experiment for the KEM [1], the challenger sends the adversary a ciphertext together with either the genuine session key or a random key . The adversary’s task is to decide whether the received key is authentic or random. If can successfully submit a well-formed ciphertext to the decryption oracle, with , then the oracle must return the correct session key , enabling to distinguish the challenge. Therefore, we need to deal with such a case. As the query is different from the challenge ciphertext , when , there are three cases:
- (i)
- and ;
- (ii)
- and ;
- (iii)
- and .
Case (i) occurs with negligible probability by Lemma 7 [1]. Case (ii) is also considered in Lemma 8 [1]. To be more precise, in Lemma 8, the authors mentioned the case where “ (thus, ) and ”. The assumption that implies that is incorrect because can be sampled independently of . We double-checked the proof of the Lemma 8 to ascertain if it is a typo, but from the arguments in Lemma 8, only the case (ii) is considered. As a result, the case (iii) is missing in [1] and it is not clear how to argue the security in this case in the original construction. Therefore, the security proof of Boyen [1] is not complete. However, we observe that to deal with case (iii), such should not be considered as the whole valid session key. Our solution is setting session key
deriving the session key not just from but also from the SIS hash of . When receiving the session key from the decapsulation oracle for any kind of ciphertext, an adversary cannot find any linkability to challenge the session key except in the case that and , which can happen with negligible probability, and in the case that , which is unlikely to happen, assuming the computational intractability of the SIS assumption. Within our updated session-key framework, this adjustment enhances the proof, yielding IND-sID-CCA2 protection for the proposed IBKEM.
To preserve these guarantees, we further adapt the gadget matrix in [1] by enlarging its dimension while maintaining its algebraic characteristics. This modification ensures that the resulting matrix continues to satisfy the essential properties required for the correctness and trapdoor extraction procedures.
1.3. Related Work
Micciancio and Peikert [7] introduced one of the earliest lattice-based public-key encryption schemes that achieved CCA1 security within the standard model. It is of the form of tag-based encryption and has inspired several follow-up works in this line of research. The BCHK transformation [2] can be used to transform the CCA1-secure scheme in [7], either using an MAC or a signature scheme, to achieve CCA2-security. Boyen, Izabachène, and Li, in [1], proposed a simple and efficient CCA2-secure KEM, starting from the tag-based encryption scheme in [7]. However, the proof in [1] remains incomplete and the parameter choice is inconsistent: the authors required the matrix used for key generation to act as a right inverse rather than the left inverse adopted in [7]. As a consequence, configurations in which the number of rows in exceeds its number of columns no longer satisfy the necessary properties. To fix this, we need the reverse. Unfortunately, the adjustment introduces a trade-off between the matrix dimension and the trapdoor quality. Our work revises that construction and parameter selection to obtain a CCA2-secure KEM with a full proof of security that matches the efficiency of the earlier design. A comparative summary of our approach with existing lattice-based PKE/KEM schemes is shown in Table 1. We adopt the same notation as in [1] for consistency: MP12 for the CCA1-secure scheme in [7], MP12-MAC and MP12-SIG for the CCA2-secure schemes obtained from using the BCHK transformation. We also note that Zhang et al. [11] proposed another lattice-based encryption achieving CCA2 resistance, though Boyen et al. [1] later observed that the associated proof omits one crucial case; we, therefore, exclude that scheme from our direct comparison.
Table 1.
Comparison for CCA2-secure PKE/KEM schemes.
Agrawal et al. [8,10] and Cash et al. [12] pioneered identity-based encryption constructions grounded on lattice assumptions in the standard model. Subsequent studies by Yamada [13] and Zhang et al. [14] enhanced efficiency, achieving adaptive IBE with compact public keys of size . At PKC’2021, Jager et al. [9] proposed the blockwise partitioning technique, which enables practical realization of adaptive identity-based key-encapsulation mechanisms (IB-KEMs) from lattices under the same model. Their design achieves smaller master key dimensions and milder LWE parameters than those required by Yamada [13] and Zhang et al. [14], though its security remains confined to the CPA level. In contrast, the present work develops an identity-based KEM that attains CCA2 security in the standard model while maintaining comparable efficiency. Our current construction supports selective security; improving it toward a fully adaptive guarantee is left as a direction for future study.
Recent research has also advanced CCA-secure IBKEM in non-lattice settings. Qiao et al. [15] proposed a continuously leakage-resilient IBKEM secure under chosen-ciphertext attacks, and Li et al. [16] introduced an identity-based multi-receiver KEM tailored for privacy-preserving federated learning. Earlier, Tomita, Ogata, and Kurosawa [17] presented a leakage-resilient CCA-secure IBKEM from simple group-based assumptions. These works represent the most recent developments on strengthening IBKEM security; however, all rely on group-based hardness assumptions such as bilinear pairings. Our construction is fundamentally different in that it achieves CCA2 security entirely from lattice assumptions, thereby contributing to post-quantum–secure IBKEM in a setting not addressed by the above works.
2. Preliminaries
2.1. Key Encapsulation Mechanism (KEM)
This part summarizes the framework of a Key Encapsulation Mechanism (KEM) and the associated security definitions.
Definition 1
(KEM). A KEM scheme Π is defined by three polynomial-time algorithms:
- : Given the security parameter λ, the algorithm outputs a public/secret key pair.
- : On input of the public key, it produces a ciphertext that encapsulates a random session key, and outputs the pair.
- : Using the public key, the ciphertext, and the secret key, it recovers the corresponding session key if the ciphertext is valid; otherwise it returns the rejection symbol ⊥.
Correctness: For every , a KEM is correct if the session key produced by encapsulation is recovered with probability 1 by decapsulation:
Security models of KEM.
The confidentiality of a KEM is captured by the adaptive chosen-ciphertext attack (IND-CCA2) experiment between a challenger and an adversary .
- Setup: runs to generate and gives T to , while keeping secret.
- Phase 1: may query the decapsulation oracle on any ciphertexts of its choice and receive the corresponding session keys.
- Challenge: The challenger generates and chooses a random session key in the key space. Then picks a bit randomly and sends to .
- Phase 2: continues to query on any ciphertext .
- Guess: Finally, outputs a bit and wins if .
The adversary’s advantage is
A KEM is IND-CCA2 secure if this advantage is negligible for all probabilistic polynomial-time adversaries.
2.2. Identity Based Key Encapsulation Mechanism (IBKEM)
This section outlines the structure and security formulation of an Identity-Based Key Encapsulation Mechanism (IBKEM).
Definition 2
(IBKEM). An IBKEM scheme Π is specified by four efficient algorithms:
- : Given the security parameter λ, the algorithm produces a master public key and a master secret key, denoted .
- : On input of the master keys and an identity , the algorithm outputs the secret key associated with that identity.
- : Using the master public key and the target identity , the algorithm generates a ciphertext that encapsulates a random session key . It then returns .
- : Given the master public key, a ciphertext, and the identity’s secret key, the algorithm recovers the session key if the ciphertext is valid; otherwise it outputs ⊥.
Correctness:
The correctness of IBKEM scheme requires that for all , and all identities in the identity space, it holds that
Security models of IBKEM:
We define the selective-identity chosen-ciphertext (IND-sID-CCA2) security of an IBKEM scheme through an interactive game between a challenger and an adversary :
- Setup: The challenger executes to produce a master key pair . It provides to the adversary while keeping secret.
- Initial: declares a target identity .
- Phase 1: The adversary may issue a polynomial number of queries to two oracles, in any sequence:
- –
- : On input of an identity , it outputs the corresponding private key .
- –
- : Given an identity and a ciphertext , it returns the session key using the secret key associated with the identity .
- Challenge: The challenger computes and chooses a random session key in the key space. Then selects a bit randomly and sends the pair to .
- Phase 2: continues to query both oracles under the restrictions that
- –
- The challenge identity is never used in .
- –
- The pair cannot be submitted to .
All other queries are answered as in Phase 1. - Guess: Finally, outputs a bit . It wins if .
The advantage of is defined as
A scheme is IND-sID-CCA2 secure when this advantage is negligible for every probabilistic polynomial-time adversary.
2.3. Lattices
Lattices can be viewed as discrete subgroups of . Let be a set of linearly independent vectors in . The lattice generated by B is defined as
Here, is of rank n and the matrix B serves as a basis of . When , the lattice is said to have full-rank.
In this work we focus primarily on q-ary lattices, a family of full-rank lattices that contain . For a matrix and , we define
and the translation of of the form
For a vector family , we write for the length of its longest generator. If is linearly independent, its Gram–Schmidt orthogonalization is obtained by processing the vectors in order, and denotes the Gram–Schmidt norm of .
For any matrix , there exists a singular value decomposition , where , are orthogonal matrices, and is a rectangular diagonal matrix with non-negative diagonal entries , arranged in non-increasing order. Such diagonal entries are uniquely determined by and are called the singular values of , denoted . They satisfy and .
A matrix in is said to be -invertible when its reduction modulo q is invertible as an element of
Gaussian distribution.
We now recall the definition of the discrete Gaussian distribution, which plays a central role in our construction.
Definition 3.
Let be a lattice. For a center vector and a positive parameter , we define the following:
The discrete Gaussian distribution over with center and parameter σ is
For simplicity, we often omit the center when it is the origin and write and in place of and , respectively. When the parameter takes the value , we denote the function simply as (i.e., ).
We will utilize the following well-known results on lattices in [18].
Lemma 1.
For , .
Lemma 2.
Let q be a prime and be positive integers satisfying . For all but at most fraction of matrices , the shortest vector in the lattice has a length of at least
Lemma 3.
Let q be a prime and with . Except for at most a fraction of matrices and for every , the distribution of vector is statistically indistinguishable from the uniform distribution over . Moreover, for any fixed, the conditional distribution of , given that , follows the discrete Gaussian .
This lemma is used in our proof to justify correctness and to analyze the session-key distribution within the key space .
Lemma 4.
Let q be prime and such that . Let and draw for some . For a binary vector , the distribution of is statistically close to the uniform distribution over .
Lattice trapdoors.
In our construction, (master) secret keys are G-trapdoors, as introduced in [7]. Below, we revisit this definition along with some useful algorithms from [7].
Definition 4.
(-trapdoor) Let n be a positive integer, a prime and set. Let and be public matrices, and let be invertible. A matrix is called a -trapdoor for with tag if .
In [7], refers to the gadget matrix where and . The lattice has a publicly known short basis satisfying and . The same work also provides an algorithm for generating a pseudorandom matrix together with a “strong” -trapdoor for whenever :
- Sample and for an invertible .
- Output together with trapdoor .
The matrix serves as a low-norm basis for and, thus, forms a valid trapdoor. Its quality is determined by its largest singular value, which satisfies except with negligible probability. The resulting matrix is nearly uniform.
To extend this construction, we follow [7] (Theorem 5.1) by introducing as an augmented gadget matrix and treat the corresponding trapdoor analogously.
Lemma 5.
Let , , , . Let be the matrix obtained by adding zero columns to the right of the gadget matrix . Let , , and be an invertible matrix. Set . Then
- is computationally indistinguishable from uniform.
- For any with , with , there exists an algorithm that, with overwhelming probability, recovers and .
The next lemma (adapted from SampleRight of Agrawal et al. [8]) will later be employed for correctness analysis in our construction.
Lemma 6.
Let , , , . Let be the matrix obtained by adding zero columns to the right of the gadget matrix . Let , , and be invertible. Define . If the parameter s satisfies , then there exists a PPT algorithm that outputs a matrix whose distribution is statistically close to . In particular, it holds that .
Hardness Assumptions
Definition 5
(Short Integer Solution—SIS Problem). Let λ be the security parameter, be positive and a real . Given a uniformly random matrix , the problem asks for a non-zero integer vector of small norm such that .
For an algorithm solving , its success probability is written as . The assumption holds if, for every PPT algorithm , this advantage is negligible in λ.
Definition 6
(Learning With Errors - LWE problem). Let q be prime, be an integer, and χ be a distribution over . An instance of the - problem provides oracle access to samples drawn either from:
- :
- Returns pairs , where is uniformly sampled from and is a noise withdrawn from χ.
- :
- Returns uniformly random pairs in .
The goal of an adversary is to distinguish which oracle it is interacting with. Its advantage is defined as
The LWE assumption asserts that this advantage is negligible for all efficient .
Hardness reductions show that is at least as difficult as approximating certain worst-case lattice problems to within polynomial factors when and , in [19].
Theorem 1
(Genise et al. [20]). Let be primitive, , and set . For and for some negligible ϵ such that , the pair
where , is within negligible statistical distance of an - instance where .
The security of our schemes relies upon the so-called the Normal form LWE with an SIS hint (SISnLWE) problem, introduced by Boyen et al. [1].
Definition 7
(Normal-form LWE with an SIS hint—SISnLWE problem). Let λ be the security parameter and define , , . Let be a distribution over . The problem is a distinguishing task formulated as follows: given the tuple
where , and , decide whether for some or whether is drawn uniformly random from .
For an adversary attempting to solve the problem, its distinguishing advantage is denoted by .
Boyen et al. [1] established that is computationally as hard as the standard problem whenever .
In the security analysis of our IBKEM construction, we rely on a computational version of this assumption, given below.
Definition 8
(Computational SISnLWE problem). Let λ be the security parameter and set , , , and let be a noise distribution over . The problem provides the adversary with the challenge tuple
where , and , . The objective is to recover .
The following lemma will later be used to bound statistical distance terms in our KEM security proof.
Lemma 7
([21]). Let be events in a common probability space such that is equivalent to . Then, .
3. CCA2-Secure KEM in the Standard Model
In this section, we revisit the CCA2-secure KEM of Boyen et al. [1] and provide a slight modification with the complete security proof with a change in setting for parameters.
3.1. Parameters
Our KEM scheme involves several parameters, defined as follows.
- Let be the security parameter and suppose that all parameters are functions of .
- Let denote a large prime modulus, and let represent the number of rows in the public matrix.
- Following [1], the secret key is an matrix. To ensure correctness, their work requires that . However, in their security proof, the simulator needs to sample a trapdoor such that has a left inverse modulo q. This requires , which is not noticed in [1]. Therefore, in our scheme, we set and let R be a square matrix of size m.
- is an error rate with the requirement that is sufficiently large.
- Set to be a Gaussian parameter.
- Let be the matrix obtained by adding zero columns to the right of the gadget matrix .
- We use the problem where we denote by the discrete Gaussian distribution parameterized by .
- is a conditional distribution over , defined as , such that the resulting matrices are -invertible with .
We also recall the following useful encoding techniques which are essential for both of the KEM and IBKEM constructions:
- is a full-rank difference encoding (FRD) introduced in [8] such that every image is an invertible matrix and so is for all distinct .
- is a hash function that is second-pre-image resistant. Without loss of generality, we assume that an efficiently computable injective encoding exists so that each hash output can be represented as an element of .
3.2. Construction
This section presents our Key Encapsulation Mechanism (KEM). It uses the parameters , as described in Section 3.1, and consists of the following three algorithms.
- Setup().
- Given a security parameter , the algorithm proceeds as follows.
- Choose a second-pre-image resistant hash function .
- Generate a random matrix and a trapdoor matrix .
- Define .
- Sample another uniform matrix .
- Output
- Encap().
- On inputting the pubic key , the encapsulation algorithm works as follows:
- Draw a random key seed .
- Sample noise vectors , .
- Set where .
- Compute .
- Compute and .
- Compute .(To reduce the ciphertext size, we can set and then encode it as an element in prior to being input to ).
- Return the ciphertext and the session key .
- Decap().
- Given the public key , a ciphertext , and the secret key , the decapsulation procedure proceeds as follows:
- Parse ; if the format is invalid, output ⊥.
- Form , then recover using .
- If either or , reject and output ⊥.
- Compute ; if the result differs from , output ⊥.
- For each coordinate , determine the corresponding bit if is closer to 0 or if is closer to .
- If output ; otherwise, output ⊥.
3.3. Correctness
We follow the work of Boyen [1] to prove the correctness of the KEM scheme. During the decapsulation process, the algorithm must successfully output with overwhelming probability. According to Lemma 1, we obtain , , with overwhelming probability. By Lemma 5, we obtain
Therefore, for a large enough , we have , and the algorithm correctly returns . Finally, as , we have , which means, for each , , that the algorithm can output from in step (5) and return the session key with overwhelming probability.
3.4. Security Analysis
We now establish that our proposed KEM construction attains IND-CCA2 security under standard lattice assumptions.
Theorem 2.
Let denote our KEM with parameters . Assume that is a second-pre-image collision resistant hash function and , , problems are computationally hard. Then, for any probabilistic polynomial-time adversary that can win the IND-CCA2 experiment with advantage ϵ, there exist algorithms , and such that
Proof.
To argue the theorem, we employ a standard game-hopping technique. Starting from the original IND-CCA2 experiment (Game 0), we progressively transform the challenger’s behavior while ensuring that the adversary’s distinguishing advantage changes only negligibly between consecutive games. Let denote the event that the adversary win Game i. □
- Game 0.
- This initial game matches the standard selective IND-CCA2 experiment between adversary and challenger . The challenger runs KeyGen() to obtain a public/secret key pair , and forward to . It chooses uniformly random and sets . computes the challenge ciphertext :where , together with a valid session key and a random session key . A random bit is selected and is sent to . The challenger subsequently answers the decapsulation queries by invoking the genuine decapsulation procedure. The adversary outputs a bit and wins the game if . This completes the description of Game 0, which coincides with the real IND-CCA2 attack experiment:
- Game 1.
- Let denote the event that the adversary asks the decapsulation oracle to decap with . Game 1 is the same as Game 0 unless the decapsulation oracle rejects if the event happens.Assume that event happens, then the corresponding errors in the valid ciphertext must satisfy w.h.p., and thus w.h.p. However, as and , one has . This implies that the probability that happens is negligible, i.e., . We note that Game 0 is similar to Game 1 except that happens. This implies that Game 0 and Game 1 differ in the adversary’s view only up to a negligible distance.
- Game 2.
- Game 2 is the same as Game 1 except in the case that does not accept with .Denote by the event that outputs where . Assume that happens. Then, we have . As is collision resistant under pre-image , we obtain and w.h.p. As is valid, , and , we deduce that w.h.p.Assume that the decapsulation query is a valid ciphertext where , with the corresponding errors . Then, challenger can use its trapdoor and run a decapsulation algorithm to recover .
- Consider the case that . As , we have . Then, challenger is able to find as a solution for the SIS problem. Therefore, such a case happens with negligible probability. One has
- If , then, as , we have . As , we have . This implies that . By Lemma 5.3 in [18], it happens with negligible probability.
In short, as Game 2 is the same as Game 1 except in the case that happens, we have - Game 3.
- Game 3 is similar to Game 2 except that we modify the way that the public parameters are generated and the way the challenge ciphertext is constructed, as follows:
- Select to be a hash function.
- Sample and .
- Sample of rank m. Find such that . According to the definition of the distribution , sampling such matrix is successful with a high probability.
- Choose .
- Choose , and set .
- Compute .
- Choose , and set .
- Compute , and .
- Set .
- Set the public key , secret key , challenge ciphertext , and the valid session key .
Challenger sends , , and together with the session key .Here, to respond to the decapsulation queries, the challenger in Game 3 computesNote that rejects any if . If , then is an invertible matrix so is still a -trapdoor for , which enables the decapsulation oracle to provide answers to queries.Note that and are correctly distributed as in the previous game. As , by Lemma 3, in ’s view, in Game 3 and in Game 2 are statistically close as well as statistically close to uniform over . In addition, is sampled uniformly at random in , and we obtain that is uniformly random in as in Game 2. Thus, the public parameters in Game 3 and Game 2 are indistinguishable.In this game, is correctly distributed. Moreover, according to Theorem 1, is statistically close to where . defined in step (8) above also satisfiesMoreover, we haveTherefore, in Game 3 is correctly distributed as in the previous game.Hence, in ’s view, Game 3 and Game 2 are indistinguishable. - Game 4.
- Game 4 is similar to Game 3 unless both session key and are sampled uniformly at random. In this case, does not have any advantage, i.e.,We need to show that distinguishing between Game 4 and Game 3 is reduced to solving the problem.Suppose can distinguish between Games 4 and Game 3 with non-negligible probability. We will construct an algorithm to solve the SISnLWE problem.Recall from Definition 8 that an SISnLWE problem instance provides its challenge where and and asks if there is a vector such that or if is random. The challenger utilizes and proceeds as follows:
- Select a hash function .
- Set from the SISnLWE challenge.
- Sample and find such that .
- Set so that .
- Sample .
- Set with from the challenge.
- Select and set .
- Define and .
- Set .
- Set , , . Set and choose a random session key in the key space.
- Return , , and with and keep secret.
- The challenger answer and as in the previous game.
When the SISnLWE oracle is pseudorandom, meaning that , we haveandwhere and . Therefore, is distributed exactly as in Game 3.When the SISnLWE oracle is random, we have that is uniform in . Thus, in step (7) and in step (6) above are uniform in . In particular, the challenge session keys are uniform and do not depend on as in Game 4. Hence, ’s advantage in solving the SISnLWE problem is the same as ’s advantage in distinguishing Game 3 and Game 4, i.e.,From the above, one hasThis completes the proof.
4. CCA2-Secure IBKEM in the Standard Model
This section introduces an IBKEM scheme obtained from our KEM scheme, and provides its IND-sID-CCA2 security proof in the standard model. We have to deal with more cases than in KEM’s security proof because of the appearance of identities in the queries of the adversary.
4.1. Parameters
The IBKEM involves several parameters, which are functions of the security parameter .
- Let be prime, be positive, and set .
- Let be the gadget matrix and be the matrix obtained by adding zero columns to the right of .
- is an error rate for LWE such that .
- We use the problem.
- is a distribution on defined as conditioned on the resulting matrix being -invertible where .
- is a Gaussian parameter.
- .
4.2. Construction
This section describes the proposed IBKEM with parameters specified as in Section 4.1. Our IBKEM construction is as follows:
- Setup().
- On input security parameter , it proceeds as follows:
- Choose a second-pre-image collision resistant hash function .
- Select uniformly random matrices and .
- Set .
- Sample uniformly random matrices , .
- Return the master key pair
- Extract().
- On inputting the master pubic key , the master secret key , and an identity , the algorithm proceeds as follows:
- Compute .
- Sample s.t. .
- Return secret key .
- Encap().
- On inputting the master pubic key and an identity , the algorithm proceeds as follows:
- Sample .
- Sample noise vectors , .
- Set where .
- Compute .
- Compute and .
- Compute .
- Return and the session key .
- Decap().
- On inputting , it uses to decap as follows:
- Parse ; output ⊥ if does not parse.
- Set and recover via .
- If or , output ⊥.
- If , output ⊥.
- Set if the i-th coordinate of is closer to 0 or if is closer to .
- If then return the session key ; otherwise, return ⊥.
4.3. Correctness
Following the procedure of the scheme described above, during decryption of encapsulated a session key for an identity , we have that the algorithm will recover with overwhelming probability. As , , where and has the distribution , according to Lemma 1, we have , , except with a negligible probability. Let , and by Lemma 5, we obtain
Therefore, for a large enough , the algorithm correctly returns . Finally, as , we obtain , which means that for each , we have . Thus, we obtain from in step (5) of the algorithm and return with overwhelming probability.
4.4. Security Analysis
In this section, we prove that our proposed scheme is secure against an adaptive adversary (cf. Theorem 3).
Theorem 3.
The IBKEM scheme with parameters achieves security with conditions that H is a second-pre-image collision resistant hash function , and , , and are hard. In particular, if there exists an adversary against the game with advantage ϵ, then there are some adversaries , and such that
Proof.
We will proceed in a sequence of games to prove the security where Game 0 is the original game and has no advantage in winning the game in the last game. Let denote the event that the adversary wins Game i. □
- Game 0.
- It is the selectively security game between and an challenger.After receiving the challenge identity from , the challenger operates to generate and . Then, sends through to , keeps secret, chooses uniformly random , , and sets . It then computes the challenge ciphertext :where , together with a valid session key , and samples a random session key from the key space . Finally, picks a random bit and sends the pair through to the adversary .The challenger implements the key extraction oracle and the decapsulation oracle by following the real algorithms in the construction. The adversary returns a bit and wins the game if . By the definition, we have
- Game 1.
- Game 1 is identical to Game 0 except that the decapsulation oracle rejects any ciphertext of the challenge identity if .Let be the event that the adversary issues a decap of of where .Assuming that event happens, we have . Because of the pre-image collision resistance of H, and w.h.p. As is valid, , and , we obtain w.h.p.Assume that the decapsulation query is a valid ciphertext , where , with the corresponding errors . Then, the challenger can use its trapdoor and run a decapsulation algorithm to recover .
- If , then, as , we must have with overwhelming probability, and is actually a solution for the SIS problem. Such a case happens with negligible probability. We have
- If , then, as , we have . As , we have . This implies that . This happens with negligible probability by Lemma 5.3 [22].
In short, as Game 1 is the same as Game 0 unless happens, then - Game 2.
- Game 2 is similar to Game 1 unless that we modify the way is generated and the way together with the valid session are constructed, as follows:
- Select a hash function .
- Sample and .
- Sample and set . Find such that .We can successfully sample such matrix of rank m with an overwhelming probability.
- Set .
- Sample , and set .
- Compute .
- Sample , and set .
- Compute , , and .
- Set .
- Set .
- Set , , , and the valid session key .
Challenger sends and together with the session key to .- We do not allow to query for . To answer the key extraction query for , the challenger computesBy the property of , is an invertible matrix in , so can sample
- Let be the event that asks for the decapsulation queries of identity . Let the game abort when event happens.Note that the case consists of the case and the case . This means that Game 2 aborts if .
- To answer to the decapsulation oracle of a valid of with , the challenger computesand sets the secret key .As , is invertible, so the decapsulation oracle is able to respond to valid ciphertext by invoking to recover and .
Note that is correctly distributed as in the previous game. As , by using Lemma 3, in ’s view, the matrices , in Game 2 and in Game 1 are indistinguishable and statistically close to uniform over . In addition, is chosen uniformly at random in , so is a uniformly random matrix in as in Game 1. Hence, the public parameters in Game 2 and Game 1 are indistinguishable.In this game, is correctly distributed. By Theorem 1, we have that is statistically close to asThe vector defined in step (8) above also satisfiesMoreover, we haveTherefore, in Game 2 is correctly distributed as in the previous game.Hence, in ’s view, Game 2 and Game 1 are indistinguishable. - Game 3.
- Game 3 is similar to Game 2 unless and are uniformly random. We haveWe now show that Game 3 and Game 2 are computationally indistinguishable by reducing to the problem.Suppose the adversary can distinguish Game 3 and Game 2 with non-negligible advantage. We will then build the simulator that can solve the SISnLWE problem. Recall from Definition 8 that an SISnLWE problem instance provides its challenge , where and , and asks if there is a vector such that or if is random. uses as follows:
- Choose a hash function .
- Set from the SISnLWE challenge.
- Sample and set is of rank m. Find such that
- Set .
- Sample .
- Set where is from the SISnLWE challenge.
- Sample and set .
- Set and .
- Set .
- Set .
- Set , , . Set and choose randomly in the key space.
- sends the triple , and where and keeps secret.
- The simulator answers queries to and as in the previous game.
- When receives as a guess for b from , it outputs as a solution to the SISnLWE challenge.
We provide the argument that when the SISnLWE oracle is pseudorandom, meaning , is distributed exactly as in Game 2. Note thatandwhere and .Moreover, by Lemma 4 any valid is distributed statistically close to uniform in .When the SISnLWE oracle is random, we have that is uniform in . Thus, defined in step (7) and in step (6) above are uniform in . In particular, the challenge session keys are uniform and independent of as in Game 3.We conclude that the advantage of in solving the SISnLWE problem is the same as the advantage of in distinguishing Game 2 and Game 3, i.e.,It remains to be shown that the abort event happens with negligible probability under the hardness assumption of the Computational SISnLWE problem. Indeed, we can construct a simulator similarly to where can solve the Computational SISnLWE problem when adversary provides with a valid ciphertext , where for an identity . Given a Computational SISnLWE instance , runs as step 1 to step 12 of . Consider the case where adversary provides with a valid ciphertext for an identity As , we have w.h.p, meaning that and w.h.p. We must have , , with overwhelming probability where and .As is a valid ciphertext for , we deduce thatSet where . As is invertible and is a gadget matrix, there exists such that . Therefore, the simulator is able to find by calculating and then finding , which solves the Computational SISnLWE problem.We deduce that the probabilityCombining all of the inequalities above, we have thatThis concludes the proof.
5. Conclusions
In this paper, we modified the CCA2-secure KEM by Boyen et al. [1] to obtain an efficient CCA2-secure KEM scheme with a complete security proof. We also introduced a construction of an efficient and simple CCA2-secure IBKEM based on the hardness of Normal-form Learning With Errors with a Shortest Integer Solution hint problem defined by Boyen et al. [1]. Our IBKEM obtained selectively-security only. One can apply Yamada’s technique [13] for adaptive setting but computations on parameters show that it is inefficient. Therefore, it is an interesting challenge to design a comparable efficient CCA2-secure IBKEM with adaptive security.
Author Contributions
Conceptualization, N.A.V.N. and D.H.D.; methodology, N.A.V.N. and D.H.D.; validation, N.A.V.N. and D.H.D.; formal analysis, N.A.V.N., D.H.D., and M.T.T.P.; writing—original draft preparation, N.A.V.N. and M.T.T.P.; writing—review and editing, N.A.V.N., D.H.D., and M.T.T.P.; visualization, N.A.V.N. and M.T.T.P.; supervision, D.H.D.; project administration, N.A.V.N. and D.H.D.; funding acquisition, N.A.V.N. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Vietnam National University HoChiMinh City (VNU-HCM) under grant number DS.C2025-26-20.
Data Availability Statement
No new data were generated or analyzed in support of this research.
Conflicts of Interest
The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
References
- Boyen, X.; Izabachène, M.; Li, Q. A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model. In Proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, Amalfi, Italy, 14–16 September 2020; Galdi, C., Kolesnikov, V., Eds.; Springer: Cham, Switzerland, 2020; pp. 321–337. [Google Scholar]
- Boneh, D.; Canetti, R.; Halevi, S.; Katz, J. Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 2007, 36, 1301–1328. [Google Scholar] [CrossRef]
- Peikert, C.; Vaikuntanathan, V.; Waters, B. A Framework for Efficient and Composable Oblivious Transfer. In Proceedings of the 28th Annual International Cryptology Conference, Advances in Cryptology—CRYPTO 2008, Santa Barbara, CA, USA, 17–21 August 2008; Proceedings; Lecture Notes in Computer Science. Wagner, D.A., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5157, pp. 554–571. [Google Scholar] [CrossRef]
- Boyen, X.; Li, Q. Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. In Proceedings of the 10th International Conference, PQCrypto 2019, Chongqing, China, 8–10 May 2019; Revised Selected Papers; Lecture Notes in Computer Science. Ding, J., Steinwandt, R., Eds.; Springer: Cham, Switzerland, 2019; Volume 11505, pp. 116–130. [Google Scholar] [CrossRef]
- Bellare, M.; Kiltz, E.; Peikert, C.; Waters, B. Identity-Based (Lossy) Trapdoor Functions and Applications. In Proceedings of the Advances in Cryptology–EUROCRYPT 2012–31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Proceedings; Lecture Notes in Computer Science. Pointcheval, D., Johansson, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7237, pp. 228–245. [Google Scholar] [CrossRef]
- Boyen, X.; Mei, Q.; Waters, B. Direct chosen ciphertext security from identity-based techniques. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, 7–11 November 2005; Atluri, V., Meadows, C.A., Juels, A., Eds.; ACM: New York, NY, USA, 2005; pp. 320–329. [Google Scholar] [CrossRef]
- Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
- Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (H)IBE in the standard model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 553–572. [Google Scholar]
- Jager, T.; Kurek, R.; Niehues, D. Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. In Proceedings of the Public-Key Cryptography–PKC 2021–24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, 10–13 May 2021; Proceedings, Part I; Lecture Notes in Computer Science. Garay, J.A., Ed.; Springer: Cham, Switzerland, 2021; Volume 12710, pp. 596–626. [Google Scholar] [CrossRef]
- Agrawal, S.; Boneh, D.; Boyen, X. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In Proceedings of the Advances in Cryptology–CRYPTO 2010—30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2010; Rabin, T., Ed.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 98–115. [Google Scholar]
- Zhang, J.; Yu, Y.; Fan, S.; Zhang, Z. Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 2020, 63, 182101. [Google Scholar] [CrossRef]
- Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 523–552. [Google Scholar]
- Yamada, S. Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques. In Proceedings of the Annual International Cryptology Conference, 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Springer: Cham, Switzerland, 2017; pp. 161–193. [Google Scholar]
- Zhang, J.; Chen, Y.; Zhang, Z. Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. In Proceedings of the Advances in Cryptology–CRYPTO 2016–36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Proceedings, Part III; Lecture Notes in Computer Science. Robshaw, M., Katz, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2016; Volume 9816, pp. 303–332. [Google Scholar] [CrossRef]
- Qiao, Z.; Zhu, Y.; Zhou, Y.; Yang, B. A continuous leakage-resilient CCA secure identity-based key encapsulation mechanism in the standard model. J. Syst. Archit. 2025, 162, 103388. [Google Scholar] [CrossRef]
- Li, Y.; Wang, C.; Hu, S. KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-receiver Key Encapsulation. In Proceedings of the Information Security and Privacy, 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, 14–16 July 2025; Susilo, W., Pieprzyk, J., Eds.; Springer: Singapore, 2025; pp. 105–123. [Google Scholar]
- Tomita, T.; Ogata, W.; Kurosawa, K. CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions. In Proceedings of the Advances in Information and Computer Security, 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, 28–30 August 2019; Attrapadung, N., Yagi, T., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 3–22. [Google Scholar]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions. Electron. Colloq. Comput. Complex. 2008, 14. [Google Scholar]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 34. [Google Scholar] [CrossRef]
- Genise, N.; Micciancio, D.; Peikert, C.; Walter, M. Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. In Proceedings of the 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, 4–7 May 2020; Lecture Notes in Computer Science. Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V., Eds.; Springer: Cham, Switzerland, 2020; Volume 12110, pp. 623–651. [Google Scholar]
- Shoup, V. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive, Report 2004/332. 2004. Available online: https://ia.cr/2004/332 (accessed on 2 December 2025).
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 17–20 May 2008; Dwork, C., Ed.; ACM: New York, NY, USA, 2008; pp. 197–206. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).