CryptoDB
Dominique Unruh
ORCID: 0000-0001-8965-1931
Publications
Year
Venue
Title
2023
PKC
A Thorough Treatment of Highly-Efficient NTRU Instantiations
Abstract
Cryptography based on the hardness of lattice problems over
polynomial rings currently provides the most practical solution for pub-
lic key encryption in the quantum era. Indeed, three of the four schemes
chosen by NIST in the recently-concluded post-quantum standardization
effort for encryption and signature schemes are based on the hardness of
these problems. While the first encryption scheme utilizing properties of
polynomial rings was NTRU (ANTS ’98), the scheme that NIST chose
for public key encryption (CRYSTALS-Kyber) is based on the hardness
of the somewhat-related Module-LWE problem. One of the reasons for
Kyber’s selection was the fact that it is noticeably faster than NTRU
and a little more compact. And indeed, the practical NTRU encryption
schemes in the literature generally lag their Ring/Module-LWE counter-
parts in either compactness or speed, or both.
In this paper, we put the efficiency of NTRU-based schemes on equal
(even slightly better, actually) footing with their Ring/Module-LWE
counterparts. We provide several instantiations and transformations, with
security given in the ROM and the QROM, that are on par, compactness-
wise, with their counterparts based on Ring/Module-LWE. Performance-
wise, the NTRU schemes instantiated in this paper over NTT-friendly
rings of the form Z_q[X]/(X^d − X^{d/2} + 1) are the fastest of all public key
encryption schemes, whether quantum-safe or not. When compared to
the NIST finalist NTRU-HRSS-701, our scheme is 15% more compact
and has a 15X improvement in the round-trip time of ephemeral key
exchange, with key generation being 35X faster, encapsulation being 6X
faster, and decapsulation enjoying a 9X speedup.
2023
ASIACRYPT
Towards compressed permutation oracles
Abstract
Compressed oracles (Zhandry, Crypto 2019) are a powerful technique to reason about quantum random oracles, enabling a sort of lazy sampling in the presence of superposition queries. A long-standing open question is whether a similar technique can also be used to reason about random (efficiently invertible) permutations.
In this work, we make a step towards answering this question. We first define the compressed permutation oracle and illustrate its use. While the soundness of this technique (i.e., the indistinguishability from a random permutation) remains a conjecture, we show a curious 2-for-1 theorem: If we use the compressed permutation oracle methodology to show that some construction (e.g., Luby-Rackoff) implements a random permutation (or strong qPRP), then we get the fact that this methodology is actually sound for free.
2022
JOFC
Everlasting UC Commitments from Fully Malicious PUFs
Abstract
Everlasting security models the setting where hardness assumptions hold during the execution of a protocol but may get broken in the future. Due to the strength of this adversarial model, achieving any meaningful security guarantees for composable protocols is impossible without relying on hardware assumptions (Müller-Quade and Unruh, JoC’10). For this reason, a rich line of research has tried to leverage physical assumptions to construct well-known everlasting cryptographic primitives, such as commitment schemes. The only known everlastingly UC secure commitment scheme, due to Müller-Quade and Unruh (JoC’10), assumes honestly generated hardware tokens. The authors leave the possibility of constructing everlastingly UC secure commitments from malicious hardware tokens as an open problem. Goyal et al. (Crypto’10) constructs unconditionally UC-secure commitments and secure computation from malicious hardware tokens, with the caveat that the honest tokens must encapsulate other tokens. This extra restriction rules out interesting classes of hardware tokens, such as physically uncloneable functions (PUFs). In this work, we present the first construction of an everlastingly UC-secure commitment scheme in the fully malicious token model without requiring honest token encapsulation. Our scheme assumes the existence of PUFs and is secure in the common reference string model. We also show that our results are tight by giving an impossibility proof for everlasting UC-secure computation from non-erasable tokens (such as PUFs), even with trusted setup.
2021
TCC
Relationships between quantum IND-CPA notions
📺
Abstract
An encryption scheme is called indistinguishable under chosen plaintext attack (short IND-CPA) if an attacker cannot distinguish the encryptions of two messages of his choice. There are other variants of this definition but they all turn out to be equivalent in the classical case.
In this paper, we give a comprehensive overview of these different variants of IND-CPA
for symmetric encryption schemes in the quantum setting.
We investigate the relationships between these notions
and prove various equivalences, implications, non-equivalences, and non-implications between these variants.
2020
PKC
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
📺
Abstract
We propose $$mathsf {FO_mathsf {AKE}}$$ , a generic construction of two-message authenticated key exchange (AKE) from any passively secure public key encryption (PKE) in the quantum random oracle model (QROM). Whereas previous AKE constructions relied on a Diffie-Hellman key exchange or required the underlying PKE scheme to be perfectly correct, our transformation allows arbitrary PKE schemes with non-perfect correctness. Dealing with imperfect schemes is one of the major difficulties in a setting involving active attacks. Our direct construction, when applied to schemes such as the submissions to the recent NIST post-quantum competition, is more natural than previous AKE transformations. Furthermore, we avoid the use of (quantum-secure) digital signature schemes which are considerably less efficient than their PKE counterparts. As a consequence, we can instantiate our AKE transformation with any of the submissions to the recent NIST competition, e.g., ones based on codes and lattices. $$mathsf {FO_mathsf {AKE}}$$ can be seen as a generalisation of the well known Fujisaki-Okamoto transformation (for building actively secure PKE from passively secure PKE) to the AKE setting. As a helper result, we also provide a security proof for the Fujisaki-Okamoto transformation in the QROM for PKE with non-perfect correctness which is tighter and tolerates a larger correctness error than previous proofs.
2020
ASIACRYPT
Post-Quantum Verification of Fujisaki-Okamoto
📺
Abstract
We present a computer-verified formalization of the post-quantum
security proof of the Fujisaki-Okamoto transform (as analyzed by
Hövelmanns, Kiltz, Schäge, and Unruh, PKC 2020). The formalization is
done in quantum relational Hoare logic and checked in the qrhl-tool
(Unruh, POPL 2019).
2019
CRYPTO
Quantum Security Proofs Using Semi-classical Oracles
📺
Abstract
We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.
2013
JOFC
Polynomial Runtime and Composability
Abstract
We devise a notion of polynomial runtime suitable for the simulation-based security analysis of multi-party cryptographic protocols. Somewhat surprisingly, straightforward notions of polynomial runtime lack expressivity for reactive tasks and/or lead to an unnatural simulation-based security notion. Indeed, the problem has been recognized in previous works, and several notions of polynomial runtime have already been proposed. However, our new notion, dubbed reactive polynomial time, is the first to combine the following properties: it is simple enough to support simple security/runtime analyses,it is intuitive in the sense that all intuitively feasible protocols and attacks (and only those) are considered polynomial-time,it supports secure composition of protocols in the sense of a universal composition theorem. We work in the Universal Composability (UC) protocol framework. We remark that while the UC framework already features a universal composition theorem, we develop new techniques to prove secure composition in the case of reactively polynomial-time protocols and attacks.
Program Committees
- Crypto 2024
- Crypto 2023
- Crypto 2021
- Crypto 2020
- Asiacrypt 2018
- Eurocrypt 2018
- Crypto 2017
- Asiacrypt 2017
- Asiacrypt 2016
- Eurocrypt 2016
- Asiacrypt 2015
- PKC 2014
- Eurocrypt 2014
- Crypto 2012
- TCC 2011
Coauthors
- Andris Ambainis (1)
- Michael Backes (3)
- Tore V. Carstens (1)
- Julien Duman (1)
- Markus Dürmuth (1)
- Ehsan Ebrahimi (1)
- Sanjam Garg (1)
- Mike Hamburg (1)
- Dennis Hofheinz (4)
- Kathrin Hövelmanns (2)
- Eike Kiltz (2)
- Vadim Lyubashevsky (1)
- Bernardo Magri (1)
- Giulio Malavolta (1)
- Jörn Müller-Quade (6)
- Vanishree Rao (1)
- Amit Sahai (1)
- Sven Schäge (1)
- Dominique Schröder (4)
- Gregor Seiler (1)
- Gelo N. Tabia (1)
- Ehsan Ebrahimi Targhi (1)
- Dominique Unruh (32)