Compact Key Storage in the Standard Model

Yevgeniy Dodis, Daniel Jost

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent work [Crypto’24], Dodis, Jost, and Marcedone introduced Compact Key Storage (CKS) as a modern approach to backup for end-to-end (E2E) secure applications. As most E2E-secure applications rely on a sequence of secrets from which, together with the ciphertexts sent over the network, all content can be restored, Dodis et al. introduced CKS as a primitive for backing up . The authors provided definitions as well as two practically efficient schemes (with different functionality-efficiency trade-offs). Both, their security definitions and schemes relied however on the random oracle model (ROM). In this paper, we first show that this reliance is inherent. More concretely, we argue that in the standard model, one cannot have a general CKS instantiation that is applicable to all “CKS-compatible games”, as defined by Dodis et al., and realized by their ROM construction. Therefore, one must restrict the notion of CKS-compatible games to allow for standard model CKS instantiations. We then introduce an alternative standard-model CKS definition that makes concessions in terms of functionality (thereby circumventing the impossibility). More precisely, we specify CKS which does not recover the original secret but a derived key , and then observe that this still suffices for many real-world applications. We instantiate this new notion based on minimal assumptions. For passive security, we provide an instantiation based on one-way functions only. For stronger notions, we additionally need collision-resistant hash functions and dual-PRFs, which we argue to be minimal. Finally, we provide a modularization of the CKS protocols of Dodis et al. In particular, we present a unified protocol (and proof) for standard-model equivalents for both protocols introduced in the original work.

Original languageEnglish (US)
Title of host publicationTheory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
EditorsElette Boyle, Elette Boyle, Mohammad Mahmoody
PublisherSpringer Science and Business Media Deutschland GmbH
Pages444-475
Number of pages32
ISBN (Print)9783031780103
DOIs
StatePublished - 2025
Event22nd Theory of Cryptography Conference, TCC 2024 - Milan, Italy
Duration: Dec 2 2024Dec 6 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15364 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd Theory of Cryptography Conference, TCC 2024
Country/TerritoryItaly
CityMilan
Period12/2/2412/6/24

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Compact Key Storage in the Standard Model'. Together they form a unique fingerprint.

Cite this