CryptoDB
Colin Boyd
Publications
Year
Venue
Title
2021
ASIACRYPT
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
📺
Abstract
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous security proofs in a strong security model, all have low communication complexity, and are particularly suitable for resource-constrained devices. We describe three protocols that apply linear key evolution to provide different performance and security properties. Correctness in parallel and concurrent protocol sessions is difficult to achieve for linearly key-evolving protocols, emphasizing the need for assurance of availability alongside the usual confidentiality and authentication security goals. We introduce synchronization robustness as a new formal security goal, which essentially guarantees that parties can re-synchronize efficiently. All of our new protocols achieve this property. Since protocols based on linear key evolution cannot guarantee that all concurrently initiated sessions successfully derive a key, we also propose two constructions with non-linear key evolution based on puncturable PRFs. These are instantiable from standard hash functions and require O( C log(|CTR|)) memory, where C is the number of concurrent sessions and |CTR| is an upper bound on the total number of sessions per party. These are the first protocols to simultaneously achieve full forward security, synchronization robustness, and concurrent correctness.
2020
CRYPTO
Fast and Secure Updatable Encryption
📺
Abstract
Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update token, received from the client, which should not reveal anything about plaintexts to an adversary.
We provide a new and highly efficient suite of updatable encryption schemes that we collectively call SHINE. In the variant designed for short messages, ciphertext generation consists of applying one permutation and one exponentiation (per message block), while updating ciphertexts requires just one exponentiation. Variants for longer messages provide much stronger security guarantees than prior work that has comparable efficiency. We present a new confidentiality notion for updatable encryption schemes that implies prior notions. We prove that SHINE is secure under our new confidentiality definition while also providing ciphertext integrity.
Service
- Eurocrypt 2022 General chair
- Asiacrypt 2019 Program committee
- Crypto 2015 Program committee
- PKC 2014 Program committee
- Asiacrypt 2013 Program committee
- Crypto 2012 Program committee
- PKC 2012 Program committee
- PKC 2011 Program committee
- Eurocrypt 2009 Program committee
- Asiacrypt 2008 Program committee
- Eurocrypt 2006 Program committee
- Asiacrypt 2005 Program committee
- PKC 2004 Program committee
- Asiacrypt 2004 Program committee
- Asiacrypt 2003 Program committee
- Asiacrypt 2001 Program chair
- Asiacrypt 1999 Program committee
- Asiacrypt 1998 Program committee
- Eurocrypt 1991 Program committee
Coauthors
- Colin Boyd (20)
- Kim-Kwang Raymond Choo (2)
- Sherman S. M. Chow (1)
- Gareth T. Davies (2)
- Ed Dawson (3)
- Bor de Kock (1)
- Ernest Foo (1)
- Yao Jiang Galteland (1)
- Kai Gellert (1)
- Kristian Gjøsteen (1)
- M. Choudary Gorantla (1)
- Yvonne Hitchcock (2)
- Tibor Jager (1)
- Greg Maitland (1)
- Wenbo Mao (2)
- Lise Millerjord (1)
- Sang-Jae Moon (1)
- Juan Manuel González Nieto (4)
- DongGook Park (2)
- Chris Pavlovski (1)
- Kun Peng (2)
- Kapalee Viswanathan (1)