PKI & Key Management

Beyond Key Escrow: Lattice-Based Registration-Based Encryption and the Paradigm Shift in PKI

PKI paradigm change

Marvin Sprey

Marvin Sprey

ML-DSA-65NIST FIPS 204
Verify →

doc: vnvc4z2nospya2uwtzziybm0

sig: edf4044a…121d232b

The debate about replacing classical public-key infrastructures is as old as PKI itself. Too complex, too error-prone, too dependent on certificate chains that break under pressure – these are not new criticisms. Yet the alternatives that have emerged over the past decades have mostly shifted the dilemma rather than solved it. Identity-Based Encryption (IBE) buys its elegant simplicity at the cost of a structural security problem that is unacceptable in high-security scenarios: key escrow. A central authority holds every private key in the system – whoever compromises that authority compromises everything.

A new paper by Zhang et al. (2026) now makes good on an approach that cuts through this Gordian knot without creating new ones: Registration-Based Encryption (RBE). What has long been considered theoretically promising but practically infeasible is, through a combination of lattice cryptography, homomorphic encodings, and a novel compression technique, lifted into the realm of real-world applicability for the first time – and with post-quantum security. If you are wondering what this looks like in practice and whether you can try it yourself in the browser: yes, you can. The interactive RBE page on this website features a complete implementation of RBE with step-by-step explanations – from key generation to decryption.

Zhang et al. (2026)

RBE represents a promising alternative to a public-key infrastructure, attaining the best of both worlds between IBE and traditional public-key encryption.

The Trilemma of Key Distribution

To understand why RBE matters, one must understand the tension it emerges from. In classical PKI, Certificate Authorities (CAs) manage certificate chains whose complexity in enterprise environments routinely leads to misconfigurations, certificate expirations, and revocation failures. Anyone who has audited a CA hierarchy knows: the attack surface is large, the operational overhead considerable.

IBE simplifies this radically. Here, the recipient's identity – an email address, for instance – is already the public key. No certificate, no lookup, no chain management. The Private Key Generator (PKG) derives a user's private key deterministically from their identity. That is elegant – but therein lies the problem: the PKG knows every private key. It must not only be trusted, but actually kept secret. Compromising the PKG means fully compromising all past and future encrypted communication.

RBE addresses this through a fundamental realignment of roles. The central authority, referred to here as the Key Curator (KC), has no access to any secret information whatsoever. It is entirely transparent and deterministic. What it does can be verified by anyone – and that is precisely what makes it secure.

RBE: The Concept in Detail

The core principle of RBE can be described in four mechanisms:

Independent key generation: Each user generates their key pair (pk, sk) locally. The KC never sees the private key – it exists solely with the user.

Transparent registration: The user registers their public key with the KC. The KC then aggregates all registered public keys into a Master Public Key (mpk), which is publicly visible.

Helper Decryption Keys: To decrypt a message addressed to them, the recipient needs, in addition to their own private key, a small piece of auxiliary information from the KC – the so-called Helper Decryption Key (hsk). Crucially, this hsk contains no secret information held by the KC; it is rather an auxiliary value derivable from public parameters.

Sublinear scaling: The fundamental goal of RBE is for encryption and decryption to scale sublinearly with the number of registered users. This is not a given – naive constructions would become more expensive with every additional registration.

The contrast to IBE is structural: whereas in IBE one authority knows and can derive all private keys, the KC in RBE knows only public keys. Whoever compromises the KC obtains – nothing of use.

The Mathematical Mechanics: Homomorphic Encodings over Lattices

The centerpiece of the Zhang et al. construction is the use of homomorphic encodings in the lattice setting, built on a dual version of the Regev cryptosystem. This choice is not coincidental: the Regev system is one of the most thoroughly analyzed post-quantum schemes, its security reduced to the Learning With Errors (LWE) problem, whose hardness against quantum attacks is well established.

The Public Key as a Lattice Problem

A public key is interpreted in the scheme as a matrix B for which the user holds a short vector s – their private key – such that:

Bs ≈ 0

The "≈ 0" is the crucial detail: this is not exact equality, but an approximation with a small error term. It is precisely this noise that makes the LWE problem hard – and thereby carries the security of the entire system.

Master Public Key via Homomorphic Aggregation

The innovation lies in treating registration as a form of hashing over a tree. Using homomorphic operations, the public keys of all users are aggregated into the mpk. Technically, this is achieved via Kronecker delta functions δᵢ(j):

  • δᵢ(j) = 1, if i = j
  • δᵢ(j) = 0, otherwise

The mpk is computed as:

mpk := Σᵢ₌₀ᴺ⁻¹ A^(δᵢ) · G⁻¹(pkᵢ)

Here, A^(δᵢ) is a matrix derived by the EvalPKDelta algorithm from the public parameters. The aggregation is entirely transparent and can be performed without any secret information held by the KC.

Encryption and the Decryption Path

Alice wants to encrypt a message for Bob (user ID i). She does so using the mpk and Bob's identity i – no certificate, no chain management. Bob obtains his hskᵢ from the KC.

The technically elegant twist lies in the decryption process: multiplying the RBE ciphertext by hskᵢ transforms it into a standard Regev ciphertext encrypted under Bob's own public key pkᵢ. Bob then decrypts this in the usual way with his private key skᵢ – a procedure he controls entirely within his own sphere.

This two-stage transformation is the mathematical core of why RBE requires no key escrow: the KC enables decryption without ever having access to the content or to any user's key.

The Actual Breakthrough: ℓ-Succinct LWE and Ciphertext Compression

Previous lattice-based RBE constructions were not practically deployable. The decisive bottleneck was ciphertext size: up to 49 MB for realistic user counts. No system managing thousands of users in practice can operate with data volumes of that magnitude.

Zhang et al. introduce a compression technique based on the ℓ-succinct LWE assumption. Through the use of special gadget matrices and trapdoor sampling procedures (specifically: TrapGen and SamplePre), a dramatic reduction is achieved:

ConfigurationCiphertext size (prior state of the art)Ciphertext size (Zhang et al. 2026)
1,000 users~9 MB0.148 MB
Speed factor (Enc)~18× faster
Speed factor (Dec)~12× faster

This is not a marginal optimization. A reduction in ciphertext size by a factor of ~60, combined with a speed improvement of an order of magnitude, represents the transition from academically interesting to practically deployable.

The ℓ-succinct LWE assumption underlying this compression is a strengthening of the classical LWE assumption. It postulates that certain structured matrices in the lattice setting are indistinguishable from random ones – even for an adversary equipped with a quantum computer.

d-ary Decomposition: Why d=64 Is No Accident

A detail that plays a central role in the implementation and will be of particular interest to cryptography developers: the choice of the parameter d in the so-called d-ary decomposition. This decomposition describes how vectors and matrices are broken down into base representations within the gadget matrix arithmetic – analogous to positional notation, but over lattice elements.

The obvious choice would be a binary decomposition with d=2, as used in many textbook constructions. Zhang et al., however, opt for d=64 in their implementation. The reason lies in a fundamental trade-off: a smaller d produces finer decompositions with more coefficients – this reduces noise growth per operation, but generates longer vectors and therefore larger ciphertexts. A larger d reverses this relationship: fewer but larger coefficients, shorter decompositions, more compact ciphertexts – but more accumulated noise.

At d=64, the authors land at the sweet spot they identified empirically and analytically as optimal for the target balance between ciphertext compactness and correct decryptability. Those who study the implementation on the RBE page will find this parameter directly in the code – and can trace exactly how a theoretical design decision translates into concrete numbers and data structures.

Key-Independent Pre-Processing

A further technically significant contribution of the paper is the support for key-independent pre-processing. The computationally intensive matrices A^(δᵢ) and H^(δᵢ,ⱼ) required for registration and helper key generation depend solely on public parameters – not on the actual public keys of users.

This has an important practical consequence: the Key Curator can perform these computations entirely offline and in advance, before any user has registered at all. The online phase – the actual registration process – is thereby reduced to inexpensive operations.

For the operation of an RBE system, this presents a clear architectural perspective: computationally intensive pre-computations can be offloaded to periods of low load, keeping the live operation lean.

Homomorphic RBE: The Outlook for Computable Ciphertexts

The paper goes a conceptual step further and defines, for the first time, a Fully Homomorphic RBE (FHRBE). Through a modification drawing on the GSW cryptosystem, homomorphic operations can be performed directly on RBE ciphertexts – without the server requiring access to users' helper keys.

What does this mean in practice? A cloud service could process encrypted data without ever decrypting it. The combination of key-escrow-free infrastructure and fully homomorphic processability is one of the open aspirations in applied cryptography. FHRBE is not yet a production-ready deployment scheme – but the theoretical foundations laid by Zhang et al. represent a concrete step in that direction.

Assessment: What RBE Is – and What It Is Not

A realistic assessment is warranted. RBE is not a drop-in replacement for PKI that can be integrated into existing TLS stacks tomorrow. The questions of standardization, interoperability with existing protocols, and auditability of KC implementations remain open. Several points merit serious consideration:

Trust model of the Key Curator: Even though the KC holds no secret keys, it remains an authority with which users must register their public keys. The availability of the KC (particularly for hsk retrieval) and the integrity of the mpk are system-critical. How this authority can be decentralized or secured through consensus mechanisms is an open research question.

Performance in practice: The figures reported in the paper are impressive – but they relate to specific configurations with 1,000 users. How does the system scale to 100,000 or 10 million registrations? The sublinear scaling guarantee is theoretically established; the practical benchmarking work for large-scale deployments has yet to be done.

Crypto-agility: For organizations planning their cryptographic architecture today, RBE is not yet a decision candidate for production systems. It is, however, a candidate for the strategic roadmap and for the watchlist of any CISO evaluating IBE-like deployment scenarios without key escrow.

Recommendations for Each Audience

For Developers

  • Familiarise yourself with the fundamentals of the dual Regev system – it is the mathematical foundation not only of RBE but of a growing ecosystem of lattice-based schemes.
  • Explore the interactive RBE implementation as a learning resource. The source code is a concrete reference for building lattice-based protocols in the browser – including the d-ary decomposition with d=64 as a directly studiable example.
  • Follow the development of the ℓ-succinct LWE assumption. Should this prove robust against further cryptanalytic scrutiny, the compression technique based on it will become increasingly relevant.
  • Watch for potential submissions to NIST Post-Quantum Cryptography Standardization – RBE schemes could become relevant in a future call.

For CISOs, Information Security Officers, and Consultants

  • RBE does not require immediate action, but it is a strategic topic to monitor: organizations evaluating or deploying IBE should actively include RBE in their comparison – the key escrow problem is a tangible compliance and liability risk.
  • Use the paper as a basis for internal awareness: the message that PKI alternatives with post-quantum security and without centralised key management are feasible changes the conversation about long-term cryptographic architectures.
  • Keep your cryptographic inventory up to date: systems currently built on IBE or classical PKI will require migration decisions in the coming years. Without knowing the current state, no well-founded migration strategy can be developed.

Conclusion: RBE Leaves the Laboratory

With the paper by Zhang et al., Registration-Based Encryption leaves the stage of theoretical feasibility. The ciphertext sizes that have prevented any practical deployment to date have been brought to a realistic level through ℓ-succinct LWE. The performance gains of an order of magnitude over the prior state of the art are not a footnote – they are the condition under which a technology can actually be trialed in real systems.

The key escrow problem that has disqualified IBE from high-security scenarios for decades is structurally solved in RBE – not through trust in institutions, but through mathematical construction. The fact that this is achieved on the basis of lattices simultaneously makes RBE a post-quantum-native paradigm: no retroactive migration, no hybrid transitional solution, but quantum-secure from the ground up.

Whether RBE will replace PKI remains to be seen. That it will fundamentally change the debate about key management architectures does not.

← Back to Blog