Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ScrambleDB] Double encryption is insufficient #45

Open
jschneider-bensch opened this issue Jan 22, 2024 · 3 comments · May be fixed by #80
Open

[ScrambleDB] Double encryption is insufficient #45

jschneider-bensch opened this issue Jan 22, 2024 · 3 comments · May be fixed by #80
Assignees

Comments

@jschneider-bensch
Copy link
Contributor

Double encryption is insufficient for re-randomization: Colluding source and destination can re-link incoming and outgoing ciphertexts since the original incoming ciphertext can be reconstructed from the re-encrypted one.

Possible solutions:

  • symmetric proxy-reencryption
  • fallback to ElGamal
@franziskuskiefer
Copy link
Member

What's the path forward here?
For the spec something like ElGamal is fine, but we should recommend what implementations should use or reason on why this is fine.

@jschneider-bensch jschneider-bensch self-assigned this Jan 24, 2024
@jschneider-bensch
Copy link
Contributor Author

My proposal would be to spec it with ElGamal for now and then see if an alternative based on symmetric proxy-reencryption matches the desired security notions or not. Would it be okay for the spec to offer the double encryption version as a possible implementation choice with the resulting security implications clearly stated?

@franziskuskiefer
Copy link
Member

I'd be fine with stating the security implications. ElGamal won't really be practical. So I'm not sure if that's worth doing (other than for prosperity and have the paper in code). We can add a comment saying that new research is needed to get the security from the paper in a real world setting. And then wait for some symmetric proxy-reencryption.
But we should put this up on slack to get their take, also on what they want to deploy (sine), and what they want to research (hpi).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants