Several recent works have established lower bounds on the communication cost of secure messaging protocols using only selected primitives. We argue that these bounds no longer apply if succinct noninteractive multi-party key exchange (SMNIKE) exists, a setup-free primitive where no party’s message depends on the number of parties. Boneh and Zhandry (CRYPTO 2014) present an iO-based multi-party NIKE construction where the setup (or a special party’s message) depends on the number of parties, and else, messages are short. SMNIKE is a strengthening of their primitive.
Jain and Jin (JJ, FOCS 2022) construct input-succinct indistinguishability obfuscation (iO) for Turing machines, opening the possibility of SMNIKE via iO. Unfortunately, the keys of known puncturable PRFs (PPRFs) grow with their input length n. For example, the punctured key of the Goldreich–Goldwasser–Micali (GGM) PPRF has size nλ.
We introduce succinct PPRFs, where the punctured key is of size 5λ and, in particular, independent of the input size, as long as the punctured point has a short description. We then show how to combine succinct PPRFs with JJ to show that a variant of the Boneh–Zhandry construction is already an SMNIKE.
At the heart of our succinct PPRF construction is a novel memorytight reduction for GGM. While the original GGM reduction requires nq game hops and space λq, our reduction needs 4qn game hops but only 5λ memory, where q is the number of PRF queries. Our proof technique allows to show that GGM is a succinct PPRF, and also that GGM as a (standard) PRF has a memory-tight reduction against adversaries who make non-repeating queries, a restriction that we prove to be inherent.
This is joint work with Joël Alwen (Amazon Research), Jérôme Govinden (TU Darmstadt), Patrick Harasser (TU Darmstadt) and Stefano Tessaro (U Washington).
Chris Brzuska is a faculty member of the departments computer science as well as mathematics and systems analysis at Aalto University in Finland. His research area is cryptography and its connections to related areas such as IT security, verification and complexity theory. Until March 2018, he was a junior professor at TU Hamburg in Germany and held the chair for IT Security Analysis in collaboration with and supported by NXP Semiconductors. Until September 2015, he was a post-doctoral researcher at Microsoft Research Cambridge, UK. Until September 2014, he was a post-doctoral researcher at Tel-Aviv University working with Benny Applebaum and Iftach Haitner. Until October 2012, he was a PhD student advised by Marc Fischlin at TU Darmstadt. During his PhD, he also visited Russell Impagliazzo at IAS from October 2011 to March 2012. Before, he studied mathematics in Duisburg-Essen, Bordeaux and Darmstadt with the key aspects cryptography, logic and lattice theory (partial orders)