Circular Security Reconsidered
نویسندگان
چکیده
The notion of circular security of pseudorandom functions (PRF) was introduced in Distance Bounding Protocols. So far, only a construction based on a random oracle model was proposed. Circular security stands between two new notions which we call Key Dependent Feedback (KDF) security and Leak security. So far, only a construction based on a random oracle was proposed. We give an algebraic construction based on a q-DDH assumpsion. We first prove that a small-domain Verifiable Random Functions (VRF) from Dodis-Yampolskiy is a circular secure PRF. We then use the extension to large-domain VRF by augmented cascading by Boneh et. al. This gives the first construction in the standard model.
منابع مشابه
Obfuscation ⇒ ( IND - CPA Security 6 ⇒ Circular Security )
Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security the adversary is given an extra “hint” consisting of a cycle of encryption of secret keys i.e., (Epk1(sk2), . . . , Epkn(sk1)). A natural question is whether every IND-CPA encryption scheme is also circular secure. It is trivial to see that this is no...
متن کاملAn Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm
This paper analyzes the Improved Cellular Message Encryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm (CMEA). We present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements made over CMEA are ineffective to thwart s...
متن کاملROSS: Resource Oriented Security Solution for Heterogeneous Clustered Sensor Networks
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such as uneven resources and innetwork processing. In this paper, we provide a resource oriented security solution (ROSS) to protect the network connectivity of HCSNs. ROSS is a robust ...
متن کاملToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016