Paper 2024/1957
NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers
Abstract
The interest in realizing generic PQC KEM-based PAKEs has increased significantly in the last few years. One such PAKE is the CAKE protocol, proposed by Beguinet et al. (ACNS ’23). However, despite its simple design based on the well-studied PAKE protocol EKE by Bellovin and Merritt (IEEE S&P ’92), both CAKE and its variant OCAKE do not fully protect against quantum adversaries, as they rely on the Ideal Cipher (IC) model. Related and follow-up works, including Pan and Zeng (ASIACRYPT ’23), Dos Santos et al. (EUROCRYPT ’23), Alnahawi et al. (CANS ’24), and Arragia et al. (IACR ’24/308) although touching on that issue, still rely on an IC. Considering the lack of a quantum IC model and the difficulty of using the classical IC to achieve secure instantiations on public keys in general and PQC in particular, we set out to eliminate it from PAKE design. In this paper, we present the No IC Encryption (NICE)-PAKE, a (semi)-generic PAKE framework providing a quantum-safe alternative for the IC, utilizing simpler cryptographic components for the authentication step. To give a formal proof for our construction, we introduce the notions of A-Part-Secrecy (A-SEC-CCA), Splittable Collision Freeness (A-CFR-CCA) and Public Key Uniformity (SPLIT-PKU) for splittable LWE KEMs. We show the relation of the former to the Non-uniform LWE and the Weak Hint LWE assumptions, as well as its application to ring and module LWE. Notably, this side quest led to some surprising discoveries, as we concluded that the new notion is not directly interchangeable between the LWE variants, or at least not in a straightforward manner. Further, we show that our approach requires some tedious tweaking for the parameter choices in both FrodoKEM and CRYSTALS-Kyber to obtain a secure PAKE construction. We also address some fundamental issues with the common IC usage and identify differences between lattice KEMs regarding their suitability for generic PQC PAKEs, especially regarding the structure of their public keys. We believe that this work marks a further step towards achieving complete security against quantum adversaries in PQC PAKEs.
Note:
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- PAKEKey Encapsulation MechanismPost-Quantum CryptographyLearning with ErrorsIdeal Cipher
- Contact author(s)
-
nouri alnahawi @ h-da de
jacobmas @ gmail com
crypto @ mitre org
alexander wiesmaier @ h-da de - History
- 2024-12-06: approved
- 2024-12-03: received
- See all versions
- Short URL
- https://ia.cr/2024/1957
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1957, author = {Nouri Alnahawi and Jacob Alperin-Sheriff and Daniel Apon and Alexander Wiesmaier}, title = {{NICE}-{PAKE}: On the Security of {KEM}-Based {PAKE} Constructions without Ideal Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1957}, year = {2024}, url = {https://eprint.iacr.org/2024/1957} }