Lattice-Based Multi-message Multi-recipient KEM/PKE with Malicious Security

  • Zeyu Liu*
  • , Katerina Sotiraki
  • , Eran Tromer
  • , Yunhao Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The efficiency of Public Key Encryption (PKE) and Key Encapsulation Mechanism (KEM), and in particular their large ciphertext size, is a bottleneck in real-world systems. This worsens in post-quantum secure schemes (e.g., lattice-based ones), whose ciphertexts are an order of magnitude larger than prior ones. The work of Kurosawa (PKC ’02) introduced multi-message multi-recipient PKE (mmPKE) to reduce the amortized ciphertext size when sending messages to more than one recipient. This notion naturally extends to multi-message multi-recipient KEM (mmKEM). In this work, we first show concrete attacks on existing lattice-based mmPKE schemes: Using malicious public keys, these attacks fully break semantic security and key privacy, and are inherently undetectable. We then introduce the first lattice-based mmKEM scheme (thereby mmPKE) that maintains full privacy even in the presence of maliciously-generated public keys. Concretely, the ciphertext size of our mmKEM for 100 recipients is >10× smaller than naively using Crystals-Kyber. We additionally show a similar efficiency gain when applied to batched random oblivious transfer, and to group oblivious message retrieval. Our scheme is proven secure under a new Module-LWE variant assumption, Oracle Module-LWE We reduce standard MLWE to this new assumption for some parameter regimes, which also gives intuition on why this assumption holds for the parameter we are interested in (along with additional cryptanalysis). Furthermore, we show an asymptotically efficient compiler that removes the assumption made in prior works that recipients know their position in the list of intended recipients for every ciphertext.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsGoichiro Hanaoka, Bo-Yin Yang
PublisherSpringer Science and Business Media Deutschland GmbH
Pages428-460
Number of pages33
ISBN (Print)9789819550982
DOIs
StatePublished - 2026
Externally publishedYes
Event31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025 - Melbourne, Australia
Duration: 8 Dec 202512 Dec 2025

Publication series

NameLecture Notes in Computer Science
Volume16247 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025
Country/TerritoryAustralia
CityMelbourne
Period8/12/2512/12/25

Keywords

  • Module-LWE
  • Public Key Encryption

Fingerprint

Dive into the research topics of 'Lattice-Based Multi-message Multi-recipient KEM/PKE with Malicious Security'. Together they form a unique fingerprint.

Cite this