Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

نویسندگان

چکیده

We construct non-malleable codes in the split-state model with codeword length m + 3λ or 5λ, where is message size and λ security parameter, depending on how conservative one is. Our scheme very simple involves a single call to block cipher meeting new notion which we dub entropic fixed-related-key security, essentially means that behaves like pseudorandom permutation when queried upon inputs sampled from distribution sufficient min-entropy, even under related-key attacks respect an arbitrary but fixed key relation. Importantly, indistinguishability only holds original secret (and not tampered key).In previous work, Fehr, Karpman, Mennink (ToSC 2018) used related assumption (where can be chosen by adversary, key) nonmalleable code 2λ. Unfortunately, no (even ideal one) satisfies their tampering function allowed cipher-dependent. In contrast, are able show large class of cipher-dependent (including those break Mennink).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Block-Wise Non-Malleable Codes

Non-malleable codes, introduced by Dziembowski, Pietrzak, and Wichs (ICS ’10) provide the guarantee that if a codeword c of a message m, is modified by a tampering function f to c′, then c′ either decodes to m or to “something unrelated” to m. It is known that non-malleable codes cannot exist for the class of all tampering functions and hence a lot of work has focused on explicitly constructing...

متن کامل

Ciphers Secure against Related-Key Attacks

In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the security of PRFand PRP-constructions against related-key attacks. For adversaries who can only transform a part of the key, we propose a construction and prove its security, assuming a conventionally secure block cipher is given. B...

متن کامل

Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited

Almost all current block-cipher-based MACs reduce their security to the pseudorandomness of their underlying block ciphers, except for a few of them to the unpredictability, a strictly weaker security notion than pseudorandomness. However, the latter MACs offer relatively low efficiency. In this paper, we investigate the feasibility of constructing rate-1 MACs from related-key unpredictable blo...

متن کامل

Message Authentication Codes from Unpredictable Block Ciphers

We design an efficient mode of operation on block ciphers, SS-NMAC. Our mode has the following properties, when instantiated with a block cipher f to yield a variable-length, keyed hash function H: (1) MAC Preservation. H is a secure message authentication code (MAC) with birthday security, as long as f is unpredictable. (2) PRF Preservation. H is a secure pseudorandom function (PRF) with birth...

متن کامل

Optimally Secure Block Ciphers from Ideal Primitives

Recent advances in block-cipher theory deliver security analyses in models where one or more underlying components (e.g., a function or a permutation) are ideal (i.e., randomly chosen). This paper addresses the question of finding new constructions achieving the highest possible security level under minimal assumptions in such ideal models. We present a new block-cipher construction, derived fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2022

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2022.i3.1-19