CryptoDB
Bas Westerbaan
Publications
Year
Venue
Title
2024
CIC
X-Wing
Abstract
<p> X-Wing is a hybrid key-encapsulation mechanism based on X25519 and ML-KEM-768. It is designed to be the sensible choice for most applications. The concrete choice of X25519 and ML-KEM-768 allows X-Wing to achieve improved efficiency compared to using a generic KEM combiner. In this paper, we introduce the X-Wing hybrid KEM construction and provide a proof of security. We show (1) that X-Wing is a classically IND-CCA secure KEM if the strong Diffie-Hellman assumption holds in the X25519 nominal group, and (2) that X-Wing is a post-quantum IND-CCA secure KEM if ML-KEM-768 is itself an IND-CCA secure KEM and SHA3-256 is secure when used as a pseudorandom function. The first result is proved in the ROM, whereas the second one holds in the standard model. Loosely speaking, this means X-Wing is secure if either X25519 or ML-KEM-768 is secure. We stress that these security guarantees and optimizations are only possible due to the concrete choices that were made, and it may not apply in the general case. </p>
2024
RWC
More Efficient Protocols for Post-Quantum Secure Messaging
Abstract
The past year has marked significant progress in secure messaging technologies. In March 2023, the Messaging Layer Security (MLS) protocol was standardized by the IETF, followed by Signal's introduction in May 2023 of PQXDH, a post-quantum alternative to the X3DH handshake.
In the first part of this presentation, we identify scalability challenges that may hinder the widespread adoption of MLS and Signal in a post-quantum context, particularly in regions with limited mobile data plans. This analysis is backed by real-world quantitative data.
In the second part of this talk, we propose a novel protocol with improved bandwidth consumption. It incorporates efficient post-quantum primitives, specifically multi-recipient public key encryption (mPKEs), optimized for secure messaging. We anticipate that our approach will be an order of magnitude more efficient than direct adaptations of existing protocols in practical scenarios.
2023
RWC
Post-Quantum Privacy Pass via Post-Quantum Anonymous Credentials
Abstract
It is known that one can generically construct a very flexible post-quantum anonymous credential scheme, supporting the showing of arbitrary predicates on its attributes using general-purpose zero-knowledge proofs secure against quantum adversaries [Fischlin, CRYPTO 2006].
Traditionally, such a generic instantiation is thought to come with impractical sizes and performance but recent advances in succinct proofs warrant a reconsideration.
We show that with careful choices and optimizations, such a scheme can perform surprisingly well. In fact, it can even perform competitively against state-of-the-art post-quantum blind signatures, for the simpler problem of post-quantum unlinkable tokens, required for a post-quantum version of \emph{privacy pass}.
To wit, a post-quantum privacy pass constructed in this way using zkDilithium, our proposal for a STARK-friendly variation on Dilithium2, allows for a trade-off between token size (76--172 kB) and generation time (0.25--4.5s) with a target proof security level of 115 bits.
Verification of these tokens can be done in ~30ms. We argue that these tokens are reasonably practical, adding less than a second upload time over traditional tokens, supported by a measurement study. We also discuss how our construction enables an improved version of rate-limited privacy pass that does not require an attester and hides usage patterns of clients.
Coauthors
- Manuel Barbosa (1)
- Deirdre Connolly (1)
- João Diogo Duarte (1)
- Armando Faz-Hernández (1)
- Keitaro Hashimoto (1)
- Aaron Kaiser (1)
- Shuichi Katsumata (1)
- Guru-Vamsi Policharla (1)
- Eamonn W. Postlethwaite (1)
- Thomas Prest (1)
- Peter Schwabe (1)
- Karolin Varner (1)
- Bas Westerbaan (3)
- Chris Wood (1)