Paper 2024/1438
Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance
Abstract
Anamorphic encryptions and anamorphic signatures assume a double key pre-shared between two parties so as to enable the transmission of covert messages. How to securely and efficiently distribute a double key under the dictator's surveillance is a central problem for anamorphic cryptography, especially when the users are forced to surrender their long-term secret keys or even the randomness used in the algorithms to the dictator. In this paper, we propose Anamorphic Authentication Key Exchange (AM-AKE) to solve the problem. Similar to anamorphic encryption, AM-AKE contains a set of anamorphic algorithms besides the normal algorithms. With the help of the anamorphic algorithms in AM-AKE, the initiator and the responder are able to exchange not only a session key but also a double key. We define robustness and security notions for AM-AKE, and also prove some impossibility results on plain AM-AKE whose anamorphic key generation algorithm only outputs a key-pair. To bypass the impossibility results, we work on two sides. -- On the one side, for plain AM-AKE, the securities have to be relaxed to resist only passive attacks from the dictator. Under this setting, we propose a generic construction of two-pass plain AM-AKE from a two-pass AKE with partially randomness-recoverable algorithms. -- On the other side, we consider (non-plain) AM-AKE whose key generation algorithm also outputs an auxiliary trapdoor besides the key-pairs. We ask new properties from AKE: its key generation algorithm has secret extractability and other algorithms have separability. Based on such a two-pass AKE, we propose a generic construction of two-pass (non-plain) AM-AKE. The resulting AM-AKE enjoys not only robustness but also the strong security against any dictator knowing both users' secret keys and even the internal randomness of the AKE algorithms and implementing active attacks. Finally, we present concrete AM-AKE schemes from the popular SIG+KEM paradigm and three-KEM paradigm for constructing AKE.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2024
- Keywords
- Anamorphic CryptographyAuthenticated Key Exchange
- Contact author(s)
-
dykler123 @ sjtu edu cn
dalen17 @ sjtu edu cn
slliu @ sjtu edu cn - History
- 2024-09-18: approved
- 2024-09-14: received
- See all versions
- Short URL
- https://ia.cr/2024/1438
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1438, author = {Weihao Wang and Shuai Han and Shengli Liu}, title = {Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1438}, year = {2024}, url = {https://eprint.iacr.org/2024/1438} }