CryptoDB
Sina Schaeffler
Publications and invited talks
Year
Venue
Title
2025
PKC
Towards Leakage-Resilient Ratcheted Key Exchange
Abstract
Ratcheted key exchange captures the heart of modern secure messaging, wherein protocol participants continuously update their secret material to protect against full state exposure through forward security (protecting past secrets and messages) and post-compromise security (recovering from compromise). However, many practical attacks only provide the adversary with partial information about the secret state of a given party, an attack vector that has been extensively studied under the umbrella of leakage resilience. Existing models of ratcheted key exchange or messaging therefore provide less-than-optimal guarantees under partial leakage due to inherent limitations in security under full state exposure that are exacerbated by relaxations in security made by many practical protocols for performance reasons.
In this work, we initiate the study of leakage-resilient ratcheted key exchange that provides typical guarantees under full state exposure and additional guarantees under partial state exposure between ratchets of the protocol. We consider unidirectional ratcheted key exchange (URKE) where one party acts as the sender and the other as receiver. Starting from the notions of Balli et al. introduced at ASIACRYPT 2020, we formalise a key indistinguishability game under randomness manipulation and bounded leakage (KIND), which in particular enables the adversary to continually leak a bounded amount of the sender's state between honest send calls. We construct a corresponding protocol from a key-updatable key encapsulation mechanism (kuKEM) and a leakage-resilient one-time MAC. By instantiating this MAC in the random oracle model (ROM), results from Balli et al. imply that in the ROM, kuKEM and KIND-secure URKE are equally powerful, i.e., can be built from each other. As a second step, given the strong limitations that key indistinguishability imposes on the adversary, we formalise a one-wayness game that also permits leakage on the receiver. We then propose a corresponding construction from leakage-resilient kuKEM, which we introduce, and a leakage-resilient one-time MAC. Furthermore, we show that leakage-resilient kuKEM and one-way-secure URKE can be built from each other in the ROM, highlighting the increased cost that strong one-way security entails. Our work opens exciting directions for developing practical, leakage-resilient messaging protocols.
2025
TCHES
Constant time lattice reduction in dimension 4 with application to SQIsign
Abstract
In this paper we propose a constant time lattice reduction algorithm for integral dimension-4 lattices. Motivated by its application in the SQIsign postquantum signature scheme, we provide for the first time a constant time LLLlike algorithm with guarantees on the length of the shortest output vector. We implemented our algorithm and ensured through various tools that it indeed operates in constant time. Our experiments suggest that in practice our implementation outputs a Minkowski reduced basis and thus can replace a non constant time lattice reduction subroutine in SQIsign.
2025
ASIACRYPT
Qlapoti: Simple and Efficient Translation of Quaternion Ideals to Isogenies
Abstract
The main building block in isogeny-based cryptography is an algorithmic
version of the Deuring correspondence, called IdealToIsogeny. This algorithm
takes as input left ideals of the endomorphism ring of a supersingular elliptic
curve and computes the associated isogeny. Building on ideas from QFESTA, the
Clapoti framework by Page and Robert reduces this problem to solving a certain
norm equation. The current state of the art is however unable to efficiently
solve this equation, and resorts to a relaxed version of it instead. This
impacts not only the efficiency of the IdealToIsogeny procedure, but also its
success probability. The latter issue has to be mitigated with complex and
memory-heavy rerandomization procedures, but still leaves a
gap between the security analysis and the actual implementation of
cryptographic schemes employing IdealToIsogeny as a subroutine.
For instance, in SQIsign the failure probability is still $2^{-60}$ which
is not cryptographically negligible.
The main contribution of this paper is a very simple and efficient algorithm
called Qlapoti which approaches the norm equation from Clapoti directly,
solving all the aforementioned problems at once. First, it makes the
IdealToIsogeny subroutine between 2.2 and 2.6 times faster. This
signigicantly improves the speed of schemes using this subroutine, including
notably SQIsign and PRISM. On top of that, Qlapoti has a cryptographically
negligible failure probability. This eliminates the need for rerandomization,
drastically reducing memory consumption, and allows for cleaner security
reductions.
Coauthors
- Giacomo Borin (1)
- Daniel Collins (1)
- Simone Colombo (1)
- Maria Corte-Real Santos (1)
- Jonathan Komada Eriksen (1)
- Otto Hanyecz (1)
- Riccardo Invernizzi (1)
- Alexander Karenin (1)
- Elena Kirshanova (1)
- Péter Kutas (1)
- Marzio Mula (1)
- Sina Schaeffler (3)
- Frederik Vercauteren (1)