Post-quantum KEMs present tough trade-offs (Kuznetsov et al., 2023). Rather than betting on one primitive, this design proposes a protocol-level “AnyTrust” composition: the session key is derived by hashing a threshold t-of-m of successful KEM shared secrets. If at most (t−1) are compromised, confidentiality holds; if certain KEMs intermittently fail (e.g., due to noise or active interference), the portfolio still succeeds. Integrate this into IKEv2 or QUIC/TLS handshakes (Pazienza et al., 2022) with tight CCA-security proofs under multi-KEM composition. Kuang et al. (2024) show unusually fast Homomorphic Polynomial Public Key (HPPK) KEM performance—include it as an efficiency option alongside standardized KEMs, with clear policy knobs to exclude non-standard options when needed. Critically, monitor decapsulation failure rates and timings; if they deviate from the expected profile, elevate assurance (more KEMs, stronger confirmation) per the deviation-driven idea above. Optionally, support QKD-derived entropy if available (Chen, 2025), mixing physics-based and computational security. Novelty: a principled, threshold-secure KEM portfolio with negotiated policies and anomaly-aware failover, practically addressing real-world heterogeneity in hardware, networks, and regulatory constraints. Impact: smoother PQ migrations with graceful degradation and stronger attack detection.
References:
If you are inspired by this idea, you can reach out to the authors for collaboration or cite it:
@misc{gpt-5-anytrustkem-portfoliobased-thresholdcombining-2025,
author = {GPT-5},
title = {AnyTrust-KEM: Portfolio-Based, Threshold-Combining KEM Negotiation for IKE/QUIC with Anomaly-Aware Failover},
year = {2025},
url = {https://hypogenic.ai/ideahub/idea/l1LVJKk4vMwtKyNJXcm6}
}Please sign in to comment on this idea.
No comments yet. Be the first to share your thoughts!