CAKE requires programming - On the provable post-quantum security of (O)CAKE

Research output: Contribution to conferencePaperAcademic

Abstract

In this work we revisit the post-quantum security of KEM-based password-authenticated key exchange (PAKE), specifically that of (O)CAKE. So far, these schemes evaded a security proof considering quantum adversaries. We give a detailed analysis of why this is the case, determining the missing proof techniques. To this end, we first provide a proof of security in the post-quantum setting, up to a single gap. This proof already turns out to be technically involved, requiring advanced techniques to reason in the QROM, including the compressed oracle and the extractable QROM. To pave the way towards closing the gap, we then further identify an efficient simulator for the ideal cipher. This provides certain programming abilities as a necessary and sufficient condition to close the gap in the proof: we demonstrate that we can close the gap using the simulator, and give a meta-reduction based on KEM-anonymity that shows the impossibility of a non-programming reduction that covers a class of KEMs that includes Kyber / ML-KEM.
Original languageEnglish
Publication statusE-pub ahead of print - 12 Mar 2025

Fingerprint

Dive into the research topics of 'CAKE requires programming - On the provable post-quantum security of (O)CAKE'. Together they form a unique fingerprint.

Cite this