CryptoDB
Colin Boyd
Publications
Year
Venue
Title
2021
ASIACRYPT
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
📺
Abstract
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous security proofs in a strong security model, all have low communication complexity, and are particularly suitable for resource-constrained devices. We describe three protocols that apply linear key evolution to provide different performance and security properties. Correctness in parallel and concurrent protocol sessions is difficult to achieve for linearly key-evolving protocols, emphasizing the need for assurance of availability alongside the usual confidentiality and authentication security goals. We introduce synchronization robustness as a new formal security goal, which essentially guarantees that parties can re-synchronize efficiently. All of our new protocols achieve this property. Since protocols based on linear key evolution cannot guarantee that all concurrently initiated sessions successfully derive a key, we also propose two constructions with non-linear key evolution based on puncturable PRFs. These are instantiable from standard hash functions and require O( C log(|CTR|)) memory, where C is the number of concurrent sessions and |CTR| is an upper bound on the total number of sessions per party. These are the first protocols to simultaneously achieve full forward security, synchronization robustness, and concurrent correctness.
2020
CRYPTO
Fast and Secure Updatable Encryption
📺
Abstract
Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update token, received from the client, which should not reveal anything about plaintexts to an adversary.
We provide a new and highly efficient suite of updatable encryption schemes that we collectively call SHINE. In the variant designed for short messages, ciphertext generation consists of applying one permutation and one exponentiation (per message block), while updating ciphertexts requires just one exponentiation. Variants for longer messages provide much stronger security guarantees than prior work that has comparable efficiency. We present a new confidentiality notion for updatable encryption schemes that implies prior notions. We prove that SHINE is secure under our new confidentiality definition while also providing ciphertext integrity.
Program Committees
- Asiacrypt 2019
- Crypto 2015
- PKC 2014
- Asiacrypt 2013
- Crypto 2012
- PKC 2012
- PKC 2011
- Eurocrypt 2009
- Asiacrypt 2008
- Eurocrypt 2006
- Asiacrypt 2005
- Asiacrypt 2004
- PKC 2004
- Asiacrypt 2003
- Asiacrypt 2001 (Program chair)
- Asiacrypt 1999
- Asiacrypt 1998
- Eurocrypt 1991
Coauthors
- Colin Boyd (20)
- Kim-Kwang Raymond Choo (2)
- Sherman S. M. Chow (1)
- Gareth T. Davies (2)
- Ed Dawson (3)
- Bor de Kock (1)
- Ernest Foo (1)
- Yao Jiang Galteland (1)
- Kai Gellert (1)
- Kristian Gjøsteen (1)
- M. Choudary Gorantla (1)
- Yvonne Hitchcock (2)
- Tibor Jager (1)
- Greg Maitland (1)
- Wenbo Mao (2)
- Lise Millerjord (1)
- Sang-Jae Moon (1)
- Juan Manuel González Nieto (4)
- DongGook Park (2)
- Chris Pavlovski (1)
- Kun Peng (2)
- Kapalee Viswanathan (1)