CryptoDB
Sebastian Faller
Publications
Year
Venue
Title
2025
EUROCRYPT
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
Abstract
An Oblivious Pseudo-Random Function (OPRF) is a two-party protocol for jointly evaluating a Pseudo-Random Function (PRF), where a user has an input x and a server has an input k. At the end of the protocol, the user learns the evaluation of the PRF using key k at the value x, while the server learns nothing about the user's input or output.
OPRFs are a prime tool for building secure authentication and key exchange from passwords, private set intersection, private information retrieval, and many other privacy-preserving systems. While classical OPRFs run as fast as a TLS Handshake, current *quantum-safe* OPRF candidates are still practically inefficient.
In this paper, we propose a framework for constructing OPRFs from post-quantum multi-party computation. The framework captures a family of so-called "2Hash PRFs", which sandwich a function evaluation in between two hashes. The core of our framework is a compiler that yields an OPRF from a secure evaluation of any function that is key-collision resistant and one-more unpredictable. We instantiate this compiler by providing such functions built from Legendre symbols, and from AES encryption. We then give a case-tailored protocol for securely evaluating our Legendre-based function, built from oblivious transfer (OT) and zero-knowledge proofs (ZKP). Instantiated with lattice-based OT and ZKPs, we obtain a quantum-safe OPRF that completes in 0.57 seconds, with less than 1MB of communication.
2023
CRYPTO
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
Abstract
WhatsApp is an end-to-end encrypted (E2EE) messaging service used by billions of people. In late 2021, WhatsApp rolled out a new protocol for backing up chat histories. The E2EE WhatsApp backup protocol (WBP) allows users to recover their chat history from passwords, leaving WhatsApp oblivious of the actual encryption keys. The WBP builds upon the OPAQUE framework for password-based key exchange, which is currently undergoing standardization.
While considerable efforts have gone into the design and auditing of the WBP, the complexity of the protocol’s design and shortcomings in the existing security analyses of its building blocks make it hard to understand the actual security guarantees that the WBP provides.
In this work, we provide the first formal security analysis of the WBP. Our analysis in the universal composability (UC) framework confirms that the WBP provides strong protection of users’ chat history and passwords. It also shows that a corrupted server can under certain conditions make more password guesses than what previous analysis suggests.
2023
ASIACRYPT
Generalized Fuzzy Password-Authenticated Key Exchange from Error Correcting Codes
Abstract
Fuzzy Password-Authenticated Key Exchange (fuzzy PAKE)
allows cryptographic keys to be generated from authentication data that
is both fuzzy and of low entropy. The strong protection against offline attacks offered by fuzzy PAKE opens an interesting avenue towards secure
biometric authentication, typo-tolerant password authentication, and automated IoT device pairing. Previous constructions of fuzzy PAKE are
either based on Error Correcting Codes (ECC) or generic multi-party
computation techniques such as Garbled Circuits. While ECC-based constructions are significantly more efficient, they rely on multiple special
properties of error correcting codes such as maximum distance separability and smoothness.
We contribute to the line of research on fuzzy PAKE in two ways. First,
we identify a subtle but devastating gap in the security analysis of the
currently most efficient fuzzy PAKE construction (Dupont et al., Eurocrypt 2018), allowing a man-in-the-middle attacker to test individual
password characters. Second, we provide a new fuzzy PAKE scheme
based on ECC and PAKE that provides a built-in protection against
individual password character guesses and requires fewer, more standard properties of the underlying ECC. Additionally, our construction
offers better error correction capabilities than previous ECC-based fuzzy
PAKEs.
Coauthors
- Ward Beullens (1)
- Jonathan Bootle (1)
- Gareth T. Davies (1)
- Lucas Dodgson (1)
- Sebastian Faller (3)
- Kai Gellert (1)
- Tobias Handirk (1)
- Julia Hesse (3)
- Máté Horváth (1)
- Kristina Hostáková (1)
- Tibor Jager (1)
- Johannes Ottenhues (1)