Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Presentation

Split-key PRFs and a new notion for hybrid KEM security

February 26, 2025

Presenters

Lise Millerjord - NTNU
Camryn Steckel - University of Waterloo

Description

In 2018, Giacon, Heuer, and Poettering introduced the idea of combiners for key encapsulation mechanisms (KEMs) . A parallel KEM combiner takes in ℓ ingredient KEMs K1, . . . ,K and a core function W, and produces a combined KEM K by computing (\(k\)i, \(c\)i) ← Ki.Enc(pki) for each of the ingredient KEMs, applying the core function to obtain the shared secret \(k\) ← W(k1, . . . , \(k\), \(c\)1∥ . . . ∥c), and finally outputting (\(k\), \(c\)1∥ . . . ∥\(c\)). They showed that if W is a split-key PRF — meaning that it is a secure PRF in any one of its ℓ key arguments — and at least one of the ingredient KEMs is IND-CCA-secure, then the combined KEM satisfies IND-CCA security for KEMs. This yields a hybrid security result, suitable for combining traditional and post-quantum algorithms: the combined KEM is secure as long as at least one of the underlying KEMs is not broken. Additionally, they provided a few constructions for split-key PRFs: several in the random oracle model and one in the standard model.

Presented at

NIST Workshop on Guidance for KEMs
February 25-26, 2025 (Virtual)

Downloads

Event Details

Location

    Virtual

Related Topics

Security and Privacy: key management, post-quantum cryptography

Created February 26, 2025, Updated April 28, 2025