AKE via 2-key KEM Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang Jingnan - - PowerPoint PPT Presentation

β–Ά
ake via 2 key kem
SMART_READER_LITE
LIVE PREVIEW

AKE via 2-key KEM Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang Jingnan - - PowerPoint PPT Presentation

Understanding and Constructing AKE via 2-key KEM Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang Jingnan He Outline Authenticated key exchange Motivations & our contributions AKE 2-key KEM AKE in a post quantum world


slide-1
SLIDE 1

Understanding and Constructing AKE via 2-key KEM

Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang Jingnan He

slide-2
SLIDE 2

Outline

  • Authenticated key exchange
  • Motivations & our contributions
  • AKE ← 2-key KEM ←
  • AKE in a post quantum world
slide-3
SLIDE 3

Diffie-Hellman Key Exchange [DH76]

  • Passive secure under DDH assumption
  • Adaptive attacks: Man-in-the-middle attack etc.
  • Basic and general idea: Authenticated Key Exchange (AKE)

𝑽B Y X 𝑦 β†’ 𝑕𝑦 = π‘Œ 𝑧 β†’ 𝑕𝑧 = 𝑍 𝑽𝑩 𝐿 = 𝑍𝑦 𝐿 = π‘Œπ‘§

slide-4
SLIDE 4

Authenticated Key Exchange

  • Authenticated Key Exchange (AKE). Binding id with static public

key using PKI etc.

  • 1. Security models

BR model, CK model, HMQV-CK, eCK model, CK+ model

  • 2. Constructions
  • Explicit: BR, CK01,IKE, Krawczyk03(SIGMA), …, Peikert14 etc.
  • Implicit: MTI, MQV, HMQV, OAKE, Okamoto07,NAXOS, BCNP+09,

FSXY12-13 etc

slide-5
SLIDE 5

General Structure of AKE

Static Pub/Sec Key π‘žπ‘™π΅/𝑑𝑙𝐡 Static Pub/Sec Key π‘žπ‘™πΆ/𝑑𝑙𝐢 Ephemeral Pub/Sec Key π‘žπ‘™π΅0/𝑑𝑙𝐡0 Ephemeral Pub/Sec Key π‘žπ‘™πΆ0/𝑑𝑙𝐢0

Session Key

slide-6
SLIDE 6

Challenges of AKE

  • The models are tedious to describe and difficult to get right;
  • just describing a concrete protocol itself can be hard enough;
  • the security proofs and checking even more so.
slide-7
SLIDE 7

Security of AKE

Adversary Capability

  • Send
  • Session state Reveal
  • Session Key Reveal
  • Corrupt
  • Test (Target) Session

πΏβˆ— β‰ˆπ‘‘ 𝐿𝑉

𝒕𝒍𝑩/𝒃 π’•π’π‘©πŸ/π’š 𝒕𝒍π‘ͺ𝟏/𝒛 𝒕𝒍π‘ͺ/𝒄 1 1

  • (1, 1) wPFS
  • (1, -) KCI
  • …
  • 8 cases
slide-8
SLIDE 8

Security of AKE

  • Bellare-Rogaway 93 (BR93)

indistinguishable type definition

  • Canetti-Krawczyk 01(CK01)

stronger security (session key, session state)

  • LaMacchia-Lauter-Mityagin 07 (eCK)

stronger (session key, ephemeral randomness,wPFS+KCI+MEX)

  • Fujioka-Suzuki-Xagawa-Yoneyama 12 (CK+)

reform the security of HMQV: CK01+wPFS+KCI+MEX

slide-9
SLIDE 9

Outline

  • Authenticated key exchange
  • Motivations & our contributions
  • AKE ← 2-key KEM ←
  • AKE in a post quantum world
slide-10
SLIDE 10

Constructions of AKE

  • Explicit AKE: using additional primitives i.e., signature or MAC
  • 1. IKE, Canetti-Krawczyk 02
  • 2. SIGMA, Krawczyk 03, Peikert 14
  • 3. TLS, Krawczyk 02
  • Implicit AKE: unique ability so as to compute the resulted session key
  • 1. MTI 86: the first one
  • 2. MQV 95: various attacks
  • 3. HMQV 05: the first provable secure implicit-AKE via gap-DH and KEA
  • 4. Okamoto 07: in standard model from DDH (Hashing Proof Sys.)
  • 5. LLM 07: NAXOS scheme from gap-DBDH
  • 6. Boyd et al. 08: Diffie-Hellman+KEM
  • 7. FSXY 12 (std.), FSXY 13 (RO)
  • 8. ZZD+15 HMQV-type based on RLWE with weaker aim
slide-11
SLIDE 11

Motivation

  • Explicit AKE
  • Implicit AKE

???

SIGMA Krawczyk 03

slide-12
SLIDE 12

Motivations

  • What is the (non-interactive) core building block of implicit AKE?
  • How to grasp and simplify the construction and analysis of implicit AKE?
slide-13
SLIDE 13

Our Works

  • What is the (non-interactive) core building block of implicit AKE?
  • propose a new primitive 2-key KEM
  • How to grasp and simplify the construction and analysis of AKE?
  • give frames of AKE to understand several well-know AKEs
  • construct new AKEs from 2-key KEM
slide-14
SLIDE 14

Outline

  • Authenticated key exchange
  • Motivations & our contributions
  • AKE ← 2-key KEM ←
  • AKE in a post quantum world
slide-15
SLIDE 15

Key Encapsulation Mechanism(KEM)

𝑠 π‘žπ‘™ (𝐷, 𝐿) 𝐿′ = 𝐿 𝑑𝑙

πΉπ‘œπ‘‘ 𝐸𝑓𝑑 πΏπ»π‘“π‘œ

slide-16
SLIDE 16

Key Exchange (transport) and KEM

𝑽B 𝐷 𝑽A (𝐷, 𝐿) = πΉπ‘œπ‘‘(π‘žπ‘™, 𝑠) 𝐸𝑓𝑑(𝑑𝑙, 𝐷) = 𝐿 = πΉπ‘œπ‘‘(π‘žπ‘™, 𝑠) π‘žπ‘™

slide-17
SLIDE 17

Our 2-key KEM

𝑠 π‘žπ‘™1 π‘žπ‘™0 (𝐷, 𝐿) 𝐿′ = 𝐿 𝑑𝑙1 𝑑𝑙0

πΉπ‘œπ‘‘ 𝐸𝑓𝑑 πΏπ»π‘“π‘œ1 πΏπ»π‘“π‘œ0

It is simple, not a big deal

slide-18
SLIDE 18

One-side AKE from 2-key KEM?

𝑽B 𝐷 𝑽A π‘žπ‘™1 (𝐷, 𝐿) = πΉπ‘œπ‘‘(π‘žπ‘™1, π‘žπ‘™0 , 𝑆𝐢) 𝐸𝑓𝑑(𝑑𝑙1, 𝑑𝑙0, 𝐷) = 𝐿 π‘žπ‘™0 The key point is how to define its security to fit the requirement of AKE

slide-19
SLIDE 19

𝐷𝐷𝐡,β‹… Security of 2-key KEM

(π·βˆ—, πΏβˆ—) = πΉπ‘œπ‘‘ π‘žπ‘™1, π‘žπ‘™0

βˆ—, 𝑠

π‘žπ‘™0

βˆ—

π·βˆ— π‘žπ‘™1 ← πΏπ»π‘“π‘œ1, Challenger 𝑩 π‘žπ‘™1, 𝑀 𝑀 = {π‘žπ‘™0

𝑗 /𝑑𝑙0 𝑗 } ← πΏπ»π‘“π‘œ0

DecO

π‘žπ‘™0

β€² , 𝐷′

𝐿′ = 𝐸𝑓𝑑(𝑑𝑙1, 𝑑𝑙0

β€² , 𝐷′)

If π‘žπ‘™0

β€² ∈ 𝑀

πΏβˆ—? = 𝐿′ 𝐿′

DecO

π‘žπ‘™0

β€² , 𝐷′ β‰  (π‘žπ‘™0 βˆ—, π·βˆ—)

Send

Session State Reveal Session Key Reveal

slide-20
SLIDE 20

𝐷𝐷𝐡,β‹… Security of 2-key KEM

πΏβˆ—? = 𝐿′ 𝐿′

DecO

π‘žπ‘™0

β€² , 𝐷′ β‰  (π‘žπ‘™0 βˆ—, π·βˆ—)

π‘žπ‘™1 ← πΏπ»π‘“π‘œ1, Challenger 𝑩 π‘žπ‘™1, 𝑀 (π·βˆ—, πΏβˆ—) = πΉπ‘œπ‘‘ π‘žπ‘™1, π‘žπ‘™0

βˆ—, 𝑠

π‘žπ‘™0

βˆ—

π·βˆ— 𝑀 = {π‘žπ‘™0

𝑗 /𝑑𝑙0 𝑗 } ← πΏπ»π‘“π‘œ0

DecO

π‘žπ‘™0

β€² , 𝐷′

𝐿′ = 𝐸𝑓𝑑(𝑑𝑙1, 𝑑𝑙0

β€² , 𝐷′)

If π‘žπ‘™0

β€² ∈ 𝑀

Send

Session State Reveal Session Key Reveal

𝐷𝑄𝐡,β‹… security β‹…, 𝐷𝐷𝐡 security

slide-21
SLIDE 21

One-side AKE from [CCA, CPA] 2-key KEM

𝑽B 𝐷 𝑽A π‘žπ‘™π΅1 (𝐷, 𝐿) = πΉπ‘œπ‘‘(π‘žπ‘™π΅1, π‘žπ‘™π΅0, 𝑠

𝐢)

π‘žπ‘™π΅0 𝐿 = 𝐸𝑓𝑑(𝑑𝑙𝐡1, 𝑑𝑙𝐡0, 𝐷)

slide-22
SLIDE 22

The other side AKE from [CCA, CPA] 2-key KEM

𝑽B 𝑽A 𝐷𝐢 π‘žπ‘™πΆ1 π‘žπ‘™πΆ0 (𝐷𝐢, 𝐿𝐢) = πΉπ‘œπ‘‘(π‘žπ‘™πΆ1, π‘žπ‘™πΆ0) 𝐿𝐢 = 𝐸𝑓𝑑(𝑑𝑙𝐢1, 𝑑𝑙𝐢0, 𝐷

𝐡)

slide-23
SLIDE 23

Main AKE frame?← [𝐷𝐷𝐡, 𝐷𝑄𝐡] 2-key KEM

𝑽B 𝐷𝐡 𝑽A π‘žπ‘™π΅1 (𝐷

𝐡, 𝐿 𝐡) = πΉπ‘œπ‘‘(π‘žπ‘™π΅1, π‘žπ‘™π΅0)

𝐿 = πΌπ‘π‘‘β„Ž 𝑑𝑗𝑒, 𝐿𝐡, 𝐿𝐢 𝑝𝑠 𝑄𝑆𝐺 𝐿𝐢 βŠ• 𝑄𝑆𝐺(𝐿𝐡) π‘žπ‘™π΅0 𝐿

𝐡 = 𝐸𝑓𝑑(𝑑𝑙𝐡1, 𝑑𝑙𝐡0, 𝐷𝐡)

𝐷𝐢 π‘žπ‘™πΆ1 π‘žπ‘™πΆ0 (𝐷𝐢, 𝐿𝐢) = πΉπ‘œπ‘‘(π‘žπ‘™πΆ1, π‘žπ‘™πΆ0) 𝐿𝐢 = 𝐸𝑓𝑑(𝑑𝑙𝐢1, 𝑑𝑙𝐢0, 𝐷

𝐡)

slide-24
SLIDE 24

Several AKE frames with Tricks

𝑽B 𝐷𝐡 𝑽A π‘žπ‘™π΅1 (𝐷

𝐡, 𝐿 𝐡) = πΉπ‘œπ‘‘(π‘žπ‘™π΅1, π‘žπ‘™π΅0)

π‘žπ‘™π΅0 𝐿

𝐡 = 𝐸𝑓𝑑(𝑑𝑙𝐡1, 𝑑𝑙𝐡2, 𝐷𝐡)

𝐷𝐢 π‘žπ‘™πΆ1 π‘žπ‘™πΆ0 (𝐷𝐢, 𝐿𝐢) = πΉπ‘œπ‘‘(π‘žπ‘™πΆ1, π‘žπ‘™πΆ0) 𝐿𝐢 = 𝐸𝑓𝑑(𝑑𝑙𝐢1, 𝑑𝑙𝐢0, 𝐷

𝐡)

𝐿 = πΌπ‘π‘‘β„Ž 𝑑𝑗𝑒, 𝐿𝐡, 𝐿𝐢 𝑝𝑠 𝑄𝑆𝐺 𝐿𝐢 βŠ• 𝑄𝑆𝐺(𝐿𝐡)

All the randomness for πΉπ‘œπ‘‘ and πΏπ»π‘“π‘œ0 is generated from both ephemeral secret 𝑠

𝐡0

and static secret key 𝑑𝑙𝐡

Trick 1

slide-25
SLIDE 25

Several AKE frames with Tricks

𝑽B 𝐷𝐡 𝑽A π‘žπ‘™π΅1 (𝐷

𝐡, 𝐿 𝐡) = πΉπ‘œπ‘‘(π‘žπ‘™π΅1, π‘žπ‘™π΅0)

π‘žπ‘™π΅0 𝐿

𝐡 = 𝐸𝑓𝑑(𝑑𝑙𝐡1, 𝑑𝑙𝐡0, 𝐷𝐡)

𝐷𝐢 π‘žπ‘™πΆ1 π‘žπ‘™πΆ0 (𝐷𝐢, βˆ’) = πΉπ‘œπ‘‘1(π‘žπ‘™πΆ1, βˆ’) 𝐿𝐢 = 𝐸𝑓𝑑(𝑑𝑙𝐢1, 𝑑𝑙𝐢0, 𝐷

𝐡)

𝐿 = πΌπ‘π‘‘β„Ž 𝑑𝑗𝑒, 𝐿𝐡, 𝐿𝐢 𝑝𝑠 𝑄𝑆𝐺 𝐿𝐢 βŠ• 𝑄𝑆𝐺(𝐿𝐡)

2-key KEM is public key π‘žπ‘™πΆ0 independent

Trick 2

slide-26
SLIDE 26

Several AKE frames with Tricks

𝑽B 𝐷𝐡 𝑽A π‘žπ‘™π΅1 (𝐷

𝐡, 𝐿 𝐡) = πΉπ‘œπ‘‘(π‘žπ‘™π΅1, π‘žπ‘™π΅0)

π‘žπ‘™π΅0 𝐿

𝐡 = 𝐸𝑓𝑑(𝑑𝑙𝐡1, 𝑑𝑙𝐡0, 𝐷𝐡)

𝐷𝐢 π‘žπ‘™πΆ1 π‘žπ‘™πΆ0 (𝐷𝐢, 𝐿𝐢) = πΉπ‘œπ‘‘(π‘žπ‘™πΆ1, π‘žπ‘™πΆ0) 𝐿𝐢 = 𝐸𝑓𝑑(𝑑𝑙𝐢1, 𝑑𝑙𝐢0, 𝐷

𝐡)

𝐿 = πΌπ‘π‘‘β„Ž 𝑑𝑗𝑒, 𝐿𝐡, 𝐿𝐢 𝑝𝑠 𝑄𝑆𝐺 𝐿𝐢 βŠ• 𝑄𝑆𝐺(𝐿𝐡)

𝐷𝐢 can be publicly computed from π‘žπ‘™π΅0 𝐷

𝐡 can be publicly computed from π‘žπ‘™πΆ0

Trick 3

slide-27
SLIDE 27

Understanding HMQV-A based on 2-key KEM

𝑽B 𝑍𝐢𝑓 𝑽A 𝐡 = 𝑕𝑏 π‘Œ 𝐿

𝐡 = 𝑍𝐢𝑓 𝑦+𝑏𝑒

𝑍 = 𝑕𝑧, 𝐷

𝐡 = 𝑍𝐢𝑓

π‘Œ = 𝑕𝑦 𝑒 = β„Ž(π‘Œ, 𝐢) 𝑓 = β„Ž(𝑍, 𝐡) 𝐿𝐢 = π‘Œπ΅π‘’ 𝑧+𝑐𝑓

slide-28
SLIDE 28

Understanding HMQV-B based on 2-key KEM

𝑽B 𝑽A π‘Œπ΅π‘’ 𝐢 = 𝑕𝑐 𝑍 𝑍 = 𝑕𝑧 π‘Œ = 𝑕𝑦, 𝐷𝐢 = π‘Œπ΅π‘’ 𝐿𝐢 = π‘Œπ΅π‘’ 𝑧+𝑐𝑓 𝑒 = β„Ž(π‘Œ, 𝐢) 𝑓 = β„Ž(𝑍, 𝐡) 𝐿

𝐡 = 𝑍𝐢𝑓 𝑦+𝑏𝑒

slide-29
SLIDE 29

Understanding HMQV based on 2-key KEM

𝑽B 𝑍𝐢𝑓 𝑽A 𝐡 = 𝑕𝑏 𝐿 = πΌπ‘π‘‘β„Ž(A, B, π‘Œ, 𝑍, 𝐿

𝐡, 𝐿𝐢)

π‘Œ 𝐿

𝐡 = 𝑍𝐢𝑓 𝑦+𝑏𝑒

π‘Œπ΅π‘’ 𝐢 = 𝑕𝑐 𝑍 𝑍 = 𝑕𝑧, 𝐷

𝐡 = 𝑍𝐢𝑓

π‘Œ = 𝑕𝑦, 𝐷𝐢 = π‘Œπ΅π‘’ 𝐿𝐢 = π‘Œπ΅π‘’ 𝑧+𝑐𝑓 𝑒 = β„Ž(π‘Œ, 𝐢) 𝑓 = β„Ž(𝑍, 𝐡)

slide-30
SLIDE 30

Understanding AKE

  • Every well-known implicit AKE implies a 2-key KEM
  • HMQV(&OAKE): 2-key KEM from gap-DH and KEA
  • LLM07: (aka. NAXOS) 2-key KEM from gap-DH
  • Okamoto 07: 2-key KEM from DDH (modified Cramer-Shoup)
  • FSXY12, improved KEM combiner in std. model
  • FSXY13, improved KEM combiner in RO model
slide-31
SLIDE 31

Generic constructions of 2-key KEM

  • CCA secure

𝐷 = 𝐷1|𝐷0, 𝐿 = 𝑔(𝐿1, 𝐿0, 𝐷)

  • GHP18, CCA secure when 𝑔 is a hash (in RO) or PRF function (in

std.).

  • It is not 𝐷𝐷𝐡,β‹… secure
  • However when adding π‘žπ‘™0 in hashing or PRF step, it is 𝐷𝐷𝐡,β‹… secure

𝐷1, 𝐿1 = πΉπ‘œπ‘‘ π‘žπ‘™1 , π‘π‘œπ‘’ (𝐷0, 𝐿0) = πΉπ‘œπ‘‘(π‘žπ‘™0)

slide-32
SLIDE 32

More Generic Constructions of 2-key KEM

  • Classical Fujioka-Okamoto transformation does not work for 𝐷𝐷𝐡,β‹…

seurity

  • Improved FO transformation by putting public key in hashing step to

generate 𝐿

slide-33
SLIDE 33

Roadmap

AKE 2-key KEM

Interactive Non-interactive

Improved KEM Combiner Improved FO [CPA,CPA] 2-key PKE FXSY12 FXSY13 HMQV OAKE NAXOS Okamoto

slide-34
SLIDE 34

AKE from Lattice

  • ZDD+15 proposed HMQV-type RLWE with BR and wPRF security

𝑓1 𝑓2 𝑓3 more communications

  • BDK+18 Kyber utilized FSXY to give a CK+ secure AKE from Module-

LWE

  • By applying the Improved FO transformation and AKE frame, we get AKE

with less communications from Module-LWE

ZZD+15, Zhang J., Zhang Z., Ding J., Snook M., Dagdelen O EUROCRYPT 2015. BDK+18, Bos, J.W., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Stehle, D Euro S&P 2018

slide-35
SLIDE 35

Conclusion

  • [CCA, CPA] secure 2-key KEM and its (generic) constructions
  • Understand HMQV, NAXOS, Okamoto, FSXY12-3 etc. via 2-key KEM
  • New Constructions based on lattice and SIDH

Thanks

slide-36
SLIDE 36

Following work: Supersingular Isogeny DH-AKE

  • Galbraith pointed out several challenges (eprint 2018\226)
  • 1. Sign-MAC? Signature via SIDH 𝑃(πœ‡2)

2. 𝑕𝑏𝑒+𝑦

  • 3. Adaptive attack. Public Key Validation
  • 4. formal Gap assumption

AKE-SIDH that is CK+ secure and supports arbitrary registration