Score:5

What uses are there (if any) for asymmetric message encryption?

si flag

What uses are there (if any) for asymmetric encryption of a message, instead of hybrid encryption? Specifically, I'm not considering asymmetric encryption of a symmetric key (eg old TLS RSA key exchange) as asymmetric encryption of a message, nor am I considering KEMs or (EC)DH as asymmetric encryption of a message, since all these methods are used to set up symmetric encryption.

I'm interested in uses of asymmetric cryptography to directly transfer message contents. Are there any cases where it's faster? Safer? Required by some government standard? As far as I know it's completely obsoleted by hybrid schemes, but I'd like to ensure I'm correct about that.

SEJPM avatar
us flag
My understanding ist that If bandwidth / storage size is an extremely limited commodity then such direct encryption methods become viable. I have particularly heard of smart cards for this set of restrictions but have no actual (anecdotal) evidence to back it up.
Reppiz avatar
gb flag
as far as i know there is not really a use case where it probably would make sense to encrypt a "message" directly with an asymmetric scheme. As you already said: it makes sense for hybrid encryption, KEMs, or for signatures, but I can't think of any other situation where it would be beneficial. The only thing that comes into my mind would probably be if you have some application which utilizes Fully Homomorphic Encryption, which is somehow an extension to Public-Key-Crypto.
Maarten Bodewes avatar
in flag
Well, I guess this goes for any homomorphic encryption scheme, not necessarily *fully* homomorphic ones. And it can be used in a similar way in pseudonymous identity schemes, where an ID can be morphed instead. Challenge response protocols would be another candidate. Ah, we're already at 3 :)
Maarten Bodewes avatar
in flag
I'd also name key wrapping, but that's very close to KEM, if for a different use case, and it would be just as possible with a hybrid scheme. Still, HSM's do offer it.
Eugene Styer avatar
dz flag
If you know your message will fit (call it max 2048 bits plus padding for RSA, 256 bits or less for elliptic curve) you could send the message directly instead of encrypting a key, but those are (especially for elliptic curves) pretty short messages. By not using the symmetric encryption, you would be marginally (but not much) faster.
Patriot avatar
cn flag
The Merkle–Hellman knapsack cryptosystem was one of the earliest asymmetric systems--it was not a hybrid system--but it was broken by Shamir in an attack on the public key.
Score:6
cn flag

There are many scenarios in which asymmetric encryption cannot be replaced by hybrid encryption. At a high level, the common feature of these scenarios is that they exploit some algebraic property of the asymmetric encryption scheme, which a hybrid encryption method would break. This typically happens when we do not want to solely communicate data, but also want to manipulate it in a privacy-preserving manner.

The two most common ways to exploit algebraic properties of asymmetric encryption schemes are:

  • Homomorphism: given two ciphertexts $\mathsf{Enc}(m_0)$ and $\mathsf{Enc}(m_1)$, it is possible to maul them into a ciphertext $\mathsf{Enc}(m_0 \boxplus m_1)$, where $\boxplus$ is some operation (e.g. addition or multiplication).
  • Proof-friendliness: there exists efficient zero-knowledge proofs for proving statements of the form "$c$ is an encryption of a message $m$ where $m$ satisfies some given property"

Let me illustrate both with a toy scenario. Suppose we want to do a vote between two candidates, $C_0$ and $C_1$, and there are $n$ voters $V_1, \cdots, V_n$. We want to discover the result of the vote, without revealing the individual votes. A possible (simplified) solution is as follows: each voter $V_i$ encrypts its vote, which is either $0$ (if $V_i$ votes for $C_0$) or $1$ (else). Let me call $(E_1, \cdots, E_n)$ the encrypted votes. Observe that what we want to know is the following: what is the sum of the plaintext values? The result divided by $n$ corresponds to the fraction of votes that $C_1$ got; if it is more than $50\%$, they win the election.

I assume that the encryption scheme is additively homomorphic: from encryptions of $m_0$ and $m_1$, one can homomorphically compute an encryption of the sum $m_0+m_1$ (more formally, we also need a technical requirement called functional privacy: the resulting ciphertext should not leak more information than this sum).

We will have two entities: an aggregator and a decryptor. The aggregator takes the ciphertexts $E_1, \cdots E_n$, homomorphically sum them, gets an encryption $E$ of the results, and sends it to the decryptor. The decryptor has the secret key and publishes the result of the election.

But wait, there are issues! What if the decryptor lies about the decrypted values? What if $V_i$ encrypts, say, $18$ instead of $0$ or $1$? This would effectively add $18$ votes for $C_1$. Without going into details, cryptography has methods to deal with that, called zero-knowledge proofs, which allow to append a proof to an object (e.g. a ciphertext) to guarantee that it satisfies a certain property, without compromising its privacy. Here, each $V_i$ could append a proof that $E_i$ does indeed encrypt a bit (without revealing which one), and the decryptor could also send a proof that $E$ indeed decrypts to the right result (without revealing the secret decryption key).

As you can see from above, given an encryption scheme with (1) additive homomorphism and (2) the possibility of performing zero-knowledge proofs, we can build interesting applications - voting being one natural example. You can easily convince yourself that hybrid encryption breaks homomorphism in general, and if you are slightly familiar with zero-knowledge proof, you would also observe that hybrid encryption would make them extremely inefficient.

I could list many other examples along the lines of the above: e-cash, electronic auctions, anonymous credentials, and many more. What they have in common is that we want to do more than transmitting the data: we want to manipulate it, which requires some malleability, and we want to do it securely, which requires the ability to check that only authorized manipulations have been done. Both require specific asymmetric encryption with appropriate properties.

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.