Background:
The MathMesh crypto platform (refs at the bottom) is a newly-proposed technology stack which has been somewhat cheekily called a "Grand Unified Theory of Security on the Internet". Its "Meta Cryptography" module relies on the following property of Discrete-log Diffie-Hellman:
$privKey: x, pubKey: X = x.P$
$privKey: y, pubKey: Y = y.P$
Therefore you can derive "combination keys" by either combining two public keys or two private keys.
$Z=X \oplus Y = (x \otimes y).P$
for some appropriate definition of $\oplus$ and $\otimes$.
Question:
Will this survive the transition to post-quantum asymmetric KEMs? More specifically, how likely is it that there is some definition of $\oplus$ and $\otimes$ that allows "combining" of public keys and private keys in this way for lattice, code, multivariate and/or SIKE keys?
References:
Our quantum attack from Section 4 on group homomorphic encryption schemes is not immediately applicable to more general homomorphic encryption schemes, such as somewhat and (leveled) FHE schemes.
So it doesn't appear to be the case that any scheme that possesses the desired feature is necessarily broken by this distinguisher. The distinguisher appears to apply to schemes where there is no noise or prospect of decryption failure (Paillier, Elgamal, textbook RSA, etc). – Ella Rose Nov 19 '19 at 00:06