Post Quantum Lightweight OWF Candidates: Based on Theoretically Secure Primitives: Xors, Error Detection Codes, Permutations, Polynomials, Interaction, and Nesting (Short Version)

Paweł Cyprys, Shlomi Dolev, Oded Margalit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This research focuses on designing efficient commitment schemes by drawing inspiration from (perfect) information-theoretical secure primitives, e.g., the one-time pad and secret sharing. We use a random input as a mask for the committed value, outputting a function on the random input. Then, we couple the output with the committed value xored with the random input folded (half of the input xored with the other half of the) random input. First, we explore the potential of leveraging the unique properties of the one-time pad to design effective one-way functions. Our methodology applies the exclusive-or (xor) operation to two randomly chosen strings. To address concerns related to preimage mappings, we incorporate error detection codes. Additionally, we utilize permutations to overcome linearity issues in the computation process. Feistel networks are employed to ensure super pseudo-random permutation using the (random string) input (the commitment mask) and the encryption key. We propose integrating a secret-sharing scheme based on a linear polynomial to mitigate possible collisions. Lastly, we explore the possibility of nesting one-way functions as a countermeasure against potential backdoors. The resulting commitment schemes are particularly efficient, as they have fewer layers than the standard cryptographic hash functions, such as SHA, and may fit the NIST effort for lightweight IoT cryptography (e.g., ASCON [DEMS21]).

Original languageAmerican English
Title of host publicationCyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Proceedings
EditorsShlomi Dolev, Michael Elhadad, Mirosław Kutyłowski, Giuseppe Persiano
PublisherSpringer Science and Business Media Deutschland GmbH
Pages322-334
Number of pages13
ISBN (Print)9783031769337
DOIs
StatePublished - 1 Jan 2025
Event8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024 - Be'er Sheva, Israel
Duration: 19 Dec 202420 Dec 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15349 LNCS

Conference

Conference8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024
Country/TerritoryIsrael
CityBe'er Sheva
Period19/12/2420/12/24

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Cite this