Paper 2020/1555

Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange

Siyao Guo, Pritish Kamath, Alon Rosen, and Katerina Sotiraki

Abstract

LWE based key-exchange protocols lie at the heart of post-quantum public-key cryptography. However, all existing protocols either lack the non-interactive nature of Diffie-Hellman key-exchange or polynomial LWE-modulus, resulting in unwanted efficiency overhead. We study the possibility of designing non-interactive LWE-based protocols with polynomial LWE-modulus. To this end, • We identify and formalize simple non-interactive and polynomial LWE-modulus variants of existing protocols, where Alice and Bob simultaneously exchange one or more (ring) LWE samples with polynomial LWE-modulus and then run individual key reconciliation functions to obtain the shared key. • We point out central barriers and show that such non-interactive key-exchange protocols are impossible if: 1) the reconciliation functions first compute the inner product of the received LWE sample with their private LWE secret. This impossibility is information theoretic. 2) one of the reconciliation functions does not depend on the error of the transmitted LWE sample. This impossibility assumes hardness of LWE. • We give further evidence that progress in either direction, of giving an LWE-based NIKE protocol or proving impossibility of one will lead to progress on some other well-studied questions in cryptography. Overall, our results show possibilities and challenges in designing simple (ring) LWE-based non-interactive key exchange protocols.

Metadata
Available format(s)
PDF
Publication info
Preprint. MAJOR revision.
Keywords
non-interactive key exchangeLWE
Contact author(s)
katesot @ berkeley edu
History
2020-12-13: received
Short URL
https://ia.cr/2020/1555
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1555,
      author = {Siyao Guo and Pritish Kamath and Alon Rosen and Katerina Sotiraki},
      title = {Limits on the Efficiency of (Ring) {LWE} based Non-Interactive Key Exchange},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1555},
      year = {2020},
      url = {https://eprint.iacr.org/2020/1555}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.