Dear all,

Douglas and the other "TLS co-authors" discussed this briefly, but I think that Douglas is offline for the next couple of days and asked me if I could answer on behalf of the authors.

It is indeed true that the PRF-ODH assumption, as stated, wouldn't be comaptible with the usage of the x-coordinate. One needs to be a little bit more careful in this case, disallowing the adversary to flip signs of curve points. This has been done for example in a paper about the security of Bluetooth which I co-authored, where the x-coordinate is also used to derive keys. There we adapted the definition accordingly (Section 4.1 in https://eprint.iacr.org/2021/1597.pdf of this Asiacrypt 2021 paper). I don't think that this makes the assumption less plausible, only more annoying to deal with in the proofs.

We have also checked that with the modifcation above the TLS proofs goes through as before, one only needs to repeat the extracted key in executions which have the same x-coordinate (instead of the same DH values as so far).

Hope this helps to clarify. Let me know if you need more details.

Marc Fischlin

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to