Cryptology ePrint Archive: Report 2015/008

Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)

Satrajit Ghosh and Aniket Kate

Abstract: The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous users and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol 'ntor' for this purpose. Nevertheless, ntor as well as other known 1W-AKE protocols rely solely on some classical Diffie-Hellman (DH) type assumptions for their (forward) security, and thus privacy of Today's anonymous communication could not be ensured once quantum computers arrive.

In this paper, we demonstrate utility of quantum-secure lattice-based cryptography towards solving this problem for onion routing. In particular, we present a novel hybrid 1W-AKE protocol (HybridOR) that is secure under the lattice-based ring learning with error (ring-LWE) assumption as well as the gap DH assumption. Due to its hybrid design, HybridOR is not only resilient against quantum attacks but also at the same time allows the OR nodes to use the current DH public keys and subsequently requires no modification to the the current Tor public key infrastructure. Moreover, thanks to the recent progress in lattice-based cryptography in the form of efficient ring-based constructions, our protocol is also computationally more efficient than the currently employed 1W-AKE protocol ntor, and it only introduces small and manageable communication overhead to the Tor protocol.

Category / Keywords: cryptographic protocols / Tor, Onion routing, One-way authenticated key exchange, Lattice-based cryptography, Learning with error, Gap Diffie-Hellman

Original Publication (with minor differences): ACNS 2015

Date: received 6 Jan 2015, last revised 5 Jun 2015

Contact author: satrajitgh at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20150605:081046 (All versions of this report)

Short URL: ia.cr/2015/008

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]