-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
- I believe that, if we want this paper to be reviewed properly—both internally and later externally—the description needs to be much more concise, especially in Section 4.4. We should aim for a shorter yet more precise description.
- Is “planted” in Section 4.4 public or secret? I assume it is intended to be public, since otherwise the party who knows the secret would also need to solve the puzzle, which the paper states would take approximately 2.5 million years using a GPU.
- If “planted” is public, then I don’t think Layer 4 adds any security to the system. In fact, I believe it introduces additional attack surface. An adversary does not need to solve the puzzle by brute-forcing all ternary keys or by running BKW or other sophisticated attacks. (Given BKW attack, it is already incorrect to argue that the puzzle provides 2^{76} computational security; it is below 2^{40}.) Instead, an attacker can simply brute-force the space of low-entropy secrets, compute H("planted" | secret), and check whether it solves the puzzle. As a result, this construction effectively provides an easy way to recover the secret if it has low entropy, regardless of any other defenses in place.
- Layer 2 uses H(secret) as the LWE secret, which results in a small key space when the secret has low entropy. This significantly simplifies attacks on the LWE instance. Consequently, the arguments presented in Section 6.2 do not hold.
Metadata
Metadata
Assignees
Labels
No labels