CryptoDB
Jake Januzelli
Publications and invited talks
Year
Venue
Title
2025
EUROCRYPT
Under What Conditions Is Encrypted Key Exchange Actually Secure?
Abstract
A Password-Authenticated Key Exchange (PAKE) protocol allows two parties to agree upon a cryptographic key, in the setting where the only secret shared in advance is a low-entropy password. The standard security notion for PAKE is in the Universal Composability (UC) framework. In recent years there have been a large number of works analyzing the UC-security of Encrypted Key Exchange (EKE), the very first PAKE protocol, and its One-encryption variant (OEKE), both of which compile an unauthenticated Key Agreement (KA) protocol into a PAKE.
In this work, we present a comprehensive and thorough study of the UC-security of both EKE and OEKE in the most general setting and using the most efficient building blocks:
1. We show that among the five existing results on the UC-security of (O)EKE using a general KA protocol, all are incorrect;
2. We show that for (O)EKE to be UC-secure, the underlying KA protocol needs to satisfy several additional security properties: though some of these are closely related to existing security properties, some are new, and all are missing from existing works on (O)EKE;
3. We give UC-security proofs for EKE and OEKE using Programmable- Once Public Function (POPF), which is the most efficient instantiation to date and is around 4 times faster than the standard instantiation using Ideal Cipher (IC).
Our results in particular allow for PAKE constructions from post-quantum KA protocols such as Kyber. We also present a security analysis of POPF using a new, weakened notion of "almost UC" realizing a functionality, that is still sufficient for proving composed protocols to be fully UC secure.
2025
CRYPTO
Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities
Abstract
We establish new lower bounds on the size of practical garbled circuits,
which hold against any scheme satisfying the following simple properties:
(1) Its security is based on symmetric-key cryptography only.
More formally, security holds in Minicrypt, a model in which a random oracle is the only available source of cryptography.
(2) The evaluation algorithm makes non-adaptive queries to the random oracle.
(3) The evaluation algorithm ``knows'' which of its oracle queries are made by which other input combinations.
These restrictions are reasonable for garbling single gates.
In particular, unlike prior attempts at lower bounds, we make no assumptions about the internal behavior of the garbling algorithms --- i.e.,how it uses random oracle outputs and wire labels to compute the garbled gate, etc.
We prove separate lower bounds depending on whether the scheme uses the free-XOR technique (Kolesnikov & Schneider, ICALP 2008).
In the free-XOR case, we prove that a garbled AND-gate requires $1.5\lambda$ bits; thus, the garbling scheme of Rosulek & Roy (Crypto 2022) is optimal.
In the non-free-XOR case, we prove that a garbled AND-gate requires $2\lambda$ bits and a garbled XOR-gate requires $\lambda$ bits; thus, the garbling scheme of Gueron, Lindell, Nof, and Pinkas (CCS 2015) is optimal.
We prove our lower bounds using tools from information theory.
A garbling scheme can be characterized as a joint distribution over various quantities: wire labels, garbled gate information, random oracle responses.
We show that different properties of a garbling scheme imply certain Shannon-type information inequalities about this distribution.
We then use an automated theorem prover for Shannon-type inequalities to prove that our inequalities imply lower bounds on the entropy---hence, size---of the garbled gate information.
Coauthors
- Jake Januzelli (2)
- Mike Rosulek (1)
- Lawrence Roy (2)
- Jiayu Xu (1)