Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange

被引:7
|
作者
Guo, Siyao [1 ]
Kamath, Pritish [2 ]
Rosen, Alon [3 ]
Sotiraki, Katerina [4 ]
机构
[1] NYU, Shanghai, Peoples R China
[2] TTIC, Chicago, IL USA
[3] IDC, Herzliyya, Israel
[4] UC, Berkeley, CA USA
关键词
CONNECTION;
D O I
10.1007/s00145-021-09406-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
LWE-based key-exchange protocols lie at the heart of post-quantum public-key cryptography. However, all existing protocols either lack the non-interactive nature of Diffie-Hellman key exchange or polynomial LWE-modulus, resulting in unwanted efficiency overhead. We study the possibility of designing non-interactive LWE-based protocols with polynomial LWE-modulus. To this end, we identify and formalize simple non-interactive and polynomial LWE-modulus variants of the existing protocols, where Alice and Bob simultaneously exchange one or more (ring) LWE samples with polynomial LWE-modulus and then run individual key reconciliation functions to obtain the shared key. We point out central barriers and show that such non-interactive key-exchange protocols are impossible in either of the following cases: (1) the reconciliation functions first compute the inner product of the received LWE sample with their private LWE secret. This impossibility is information theoretic. (2) One of the reconciliation functions does not depend on the error of the transmitted LWE sample. This impossibility assumes hardness of LWE. We show that progress toward either a polynomial LWE-modulus NIKE construction or a general impossibility result has implications to the current understanding of lattice-based cryptographic constructions. Overall, our results show possibilities and challenges in designing simple (ring) LWE-based non-interactive key-exchange protocols.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Limits on the Efficiency of (Ring) LWE-Based Non-interactive Key Exchange
    Siyao Guo
    Pritish Kamath
    Alon Rosen
    Katerina Sotiraki
    Journal of Cryptology, 2022, 35
  • [2] Non-interactive verifiable LWE-based multi secret sharing scheme
    Niloofar Kiamari
    Massoud Hadian
    Samaneh Mashhadi
    Multimedia Tools and Applications, 2023, 82 : 22175 - 22187
  • [3] Non-interactive verifiable LWE-based multi secret sharing scheme
    Kiamari, Niloofar
    Hadian, Massoud
    Mashhadi, Samaneh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22175 - 22187
  • [4] Non-Interactive Key Exchange
    Freire, Eduarda S. V.
    Hofheinz, Dennis
    Kiltz, Eike
    Paterson, Kenneth G.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 254 - 271
  • [5] A Survey of Non-Interactive Key Exchange
    Zhang M.-R.
    Zhang R.
    Zhang L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [6] Attribute-based non-interactive key exchange
    Tang, Fei
    Zhang, Rui
    Li, Hongda
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (01)
  • [7] Attribute-based non-interactive key exchange
    Fei TANG
    Rui ZHANG
    Hongda LI
    Science China(Information Sciences), 2017, 60 (01) : 208 - 210
  • [8] AN LWE-BASED KEY TRANSFER PROTOCOL WITH ANONYMITY
    Georgescu, Adela
    TATRACRYPT '12, 2012, 53 : 119 - 135
  • [9] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [10] Better Key Sizes (and Attacks) for LWE-Based Encryption
    Lindner, Richard
    Peikert, Chris
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 319 - +