Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OPRF Applications to Key Management #9

Open
4meta5 opened this issue Jan 13, 2020 · 3 comments
Open

OPRF Applications to Key Management #9

4meta5 opened this issue Jan 13, 2020 · 3 comments

Comments

@4meta5
Copy link
Owner

4meta5 commented Jan 13, 2020

https://eprint.iacr.org/2018/733.pdf

An Oblivious PRF (OPRF) is a protocol between a server holding a key to a PRF and a user holding an input. At the end of the interaction, the user learns the output of the OPRF on its input and nothing else. The server learns nothing, including nothing about the user’s input or the function’s output...

We apply these schemes to build Oblivious Key Management Systems (KMS) as a much more secure alternative to traditional wrapping-based KMS. The new system hides keys and object identifiers from the KMS,offers unconditional security for key transport, enables forward security,provides key verifiability, reduces storage, and more...

we extend the scheme to a threshold Oblivious KMS with updatable encryption so that upon the periodic change of OPRF keys by the server, an efficient update procedure allows a client of the KMS service to non-interactively update all its encrypted data to be decryptable only by the new key.

@4meta5
Copy link
Owner Author

4meta5 commented May 1, 2020

TOPPS

To address the threat of offline dictionary attacks on the server, Mackenzie et al. [26] introduced (t,n)-Threshold PAKE (T-PAKE),which replaces a single authentication server with a group of n servers and leaks no information on passwords even if up to t servers are corrupted. Bagherzandi etal. [4] proposed a related notion of Password-Protected Secret Sharing (PPSS)which simplifies the notion of T-PAKE by reducing the goal of key exchange between user and servers to that of the user retrieving a single secret previously shared with the servers.

This paper adds a threshold for reconstructing a single secret from t + 1 shares split among n servers.

@4meta5
Copy link
Owner Author

4meta5 commented May 1, 2020

@4meta5
Copy link
Owner Author

4meta5 commented May 1, 2020

This feels somehow related to (2) in https://github.com/web3garden/sunshine-grants/issues/7 but PAKE might be overkill.

I'm still a bit confused about the difference between PAKE and the use of shared symmetric key primitives to encrypt information. There is overlap it seems...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant