CryptoDB
Bor de Kock
ORCID: 0000-0003-3143-4381
Publications
Year
Venue
Title
2024
RWC
Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange
Abstract
The advent of quantum computers has sparked significant interest in post-quantum cryptographic schemes, as a replacement for currently used cryptographic primitives.
In this context, lattice-based cryptography has emerged as the leading paradigm to build post-quantum cryptography.
However, all existing viable replacements of the classical Diffie-Hellman key exchange require additional rounds of interactions, thus failing to achieve all the benefits of this protocol.
Although earlier work has shown that lattice-based Non-Interactive Key Exchange~(NIKE) is theoretically possible, it has been considered too inefficient for real-life applications.
In this work, we challenge this folklore belief and provide the first evidence against it.
We construct an efficient lattice-based NIKE whose security is based on the standard module learning with errors (M-LWE) problem in the quantum random oracle model.
Our scheme is obtained in two steps:
(i) A passively-secure construction that achieves a strong notion of correctness, coupled with
(ii) a generic compiler that turns any such scheme into an actively-secure one.
To substantiate our efficiency claim, we provide an optimised implementation of our passively-secure construction in Rust and Jasmin.
Our implementation demonstrates the scheme's applicability to real-world scenarios, yielding public keys of approximately $220$\,KBs.
Moreover, the computation of shared keys takes fewer than $12$ million cycles on an Intel Skylake CPU, offering a post-quantum security level exceeding $120$ bits.
2021
ASIACRYPT
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
📺
Abstract
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous security proofs in a strong security model, all have low communication complexity, and are particularly suitable for resource-constrained devices. We describe three protocols that apply linear key evolution to provide different performance and security properties. Correctness in parallel and concurrent protocol sessions is difficult to achieve for linearly key-evolving protocols, emphasizing the need for assurance of availability alongside the usual confidentiality and authentication security goals. We introduce synchronization robustness as a new formal security goal, which essentially guarantees that parties can re-synchronize efficiently. All of our new protocols achieve this property. Since protocols based on linear key evolution cannot guarantee that all concurrently initiated sessions successfully derive a key, we also propose two constructions with non-linear key evolution based on puncturable PRFs. These are instantiable from standard hash functions and require O( C log(|CTR|)) memory, where C is the number of concurrent sessions and |CTR| is an upper bound on the total number of sessions per party. These are the first protocols to simultaneously achieve full forward security, synchronization robustness, and concurrent correctness.
Service
- CiC 2025 Editor
Coauthors
- Colin Boyd (1)
- Gareth T. Davies (1)
- Bor de Kock (2)
- Phillip Gajland (1)
- Kai Gellert (1)
- Tibor Jager (1)
- Giulio Malavolta (1)
- Lise Millerjord (1)
- Miguel Quaresma (1)
- Peter Schwabe (1)