Watch a 13-minute conference talk from USENIX Security '24 exploring an innovative approach to post-quantum cryptography through efficient lattice-based Non-Interactive Key Exchange (NIKE). Learn how researchers from multiple institutions challenge existing beliefs about NIKE's practicality by presenting a new construction based on the module learning with errors problem. Discover the technical details of their two-step approach, combining a passively-secure construction with strong correctness guarantees and a generic compiler for active security. Examine the real-world performance metrics of their Rust and Jasmin implementation, which achieves public keys of approximately 220 KBs and shared key computation in under 12 million cycles on Intel Skylake CPU, while maintaining post-quantum security levels above 120 bits.
Overview
Syllabus
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
Taught by
USENIX