Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

被引:54
|
作者
Derler, David [1 ]
Jager, Tibor [2 ]
Slamanig, Daniel [3 ]
Striecks, Christoph [3 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Paderborn Univ, Paderborn, Germany
[3] AIT, Vienna, Austria
基金
欧盟地平线“2020”;
关键词
Bloom Filter Encryption; Bloom filter; 0-RTT Forward secrecy; Key exchange; Puncturable encryption; SECURE IBE;
D O I
10.1007/978-3-319-78372-7_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Forward secrecy is considered an essential design goal of modern key establishment (KE) protocols, such as TLS 1.3, for example. Furthermore, efficiency considerations such as zero round-trip time (0-RTT), where a client is able to send cryptographically protected payload data along with the very first KE message, are motivated by the practical demand for secure low-latency communication. For a long time, it was unclear whether protocols that simultaneously achieve 0-RTT and full forward secrecy exist. Only recently, the first forward-secret 0-RTT protocol was described by Gunther et al. (EUROCRYPT 2017). It is based on Puncturable Encryption. Forward secrecy is achieved by "puncturing" the secret key after each decryption operation, such that a given ciphertext can only be decrypted once (cf. also Green and Miers, S&P 2015). Unfortunately, their scheme is completely impractical, since one puncturing operation takes between 30 s and several minutes for reasonable security and deployment parameters, such that this solution is only a first feasibility result, but not efficient enough to be deployed in practice. In this paper, we introduce a new primitive that we term Bloom Filter Encryption (BFE), which is derived from the probabilistic Bloom filter data structure. We describe different constructions of BFE schemes, and show how these yield new puncturable encryption mechanisms with extremely efficient puncturing. Most importantly, a puncturing operation only involves a small number of very efficient computations, plus the deletion of certain parts of the secret key, which outperforms previous constructions by orders of magnitude. This gives rise to the first forward-secret 0-RTT protocols that are efficient enough to be deployed in practice. We believe that BFE will find applications beyond forwardsecret 0-RTT protocols.
引用
收藏
页码:425 / 455
页数:31
相关论文
共 11 条
  • [1] Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    Derler, David
    Gellert, Kai
    Jager, Tibor
    Slamanig, Daniel
    Striecks, Christoph
    JOURNAL OF CRYPTOLOGY, 2021, 34 (02)
  • [2] Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    David Derler
    Kai Gellert
    Tibor Jager
    Daniel Slamanig
    Christoph Striecks
    Journal of Cryptology, 2021, 34
  • [3] 0-RTT Key Exchange with Full Forward Secrecy
    Guenther, Felix
    Hale, Britta
    Jager, Tibor
    Lauer, Sebastian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 519 - 548
  • [4] Optimizing 0-RTT Key Exchange with Full Forward Security
    Goeth, Christian
    Ramacher, Sebastian
    Slamanig, Daniel
    Striecks, Christoph
    Tairi, Erkan
    Zikulnig, Alexander
    PROCEEDINGS OF THE 2023 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2023, 2023, : 55 - 68
  • [5] Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
    Aviram, Nimrod
    Gellert, Kai
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 117 - 150
  • [6] Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
    Aviram, Nimrod
    Gellert, Kai
    Jager, Tibor
    JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
  • [7] Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
    Nimrod Aviram
    Kai Gellert
    Tibor Jager
    Journal of Cryptology, 2021, 34
  • [8] Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
    Krishna, Hosakota Vamshi
    Sekhar, Krovi Raja
    SOFT COMPUTING, 2024, 28 (03) : 2671 - 2681
  • [9] Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
    Hosakota Vamshi Krishna
    Krovi Raja Sekhar
    Soft Computing, 2024, 28 : 2671 - 2681
  • [10] Secure and Efficient Authenticated Key Exchange Mechanism for Wireless Sensor Networks and Internet of Things using Bloom Filter
    Maurya, Anup Kumar
    Sastry, V. N.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 173 - 180