Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Declassify the random seed #39

Merged
merged 1 commit into from
Jul 23, 2024
Merged

Conversation

vbgl
Copy link
Contributor

@vbgl vbgl commented Jun 14, 2024

This changes what is declassified and when.

Before, declassification only occurs during rejection sampling and what is declassified is whether rejection occurs or not.

The full sampling of the matrix expects its seed to be public: what is
declassified is the public key when it is read from memory in the
IND-CPA encryption, and the public seed when it is produced by a call
to SHA3 in keygen.

This changes what is declassified and when.

Before, declassification only occurs during rejection sampling and what
is declassified is whether rejection occurs or not.

After, the full sampling of the matrix expects its seed to be public:
what is declassified is the public key when it is read from memory in
the IND-CPA encryption, when it is derived from the output of SHA3 in
keygen.
Copy link
Contributor

@fdupress fdupress left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good to go.

There are arguments (see also on Zulip, made by me after I thought some more) that we may want to declassify the public output of keygen instead of having an internal declassification which is harder to justify purely from the security model. But we can do this as a second go once we settle the discussions.

@vbgl vbgl merged commit 6ab1069 into formosa-crypto:master Jul 23, 2024
4 checks passed
@vbgl vbgl deleted the declassify-early branch July 23, 2024 08:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants