Authenticated Encryption with Key Identification

被引:1
作者
Len, Julia [1 ]
Grubbs, Paul [2 ]
Ristenpart, Thomas [1 ]
机构
[1] Cornell Tech, New York, NY 10044 USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
来源
ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III | 2022年 / 13793卷
关键词
Key identification; Authenticated encryption; Key commitment; Key robustness; SECURITY;
D O I
10.1007/978-3-031-22969-5_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption with associated data (AEAD) forms the core of much of symmetric cryptography, yet the standard techniques for modeling AEAD assume recipients have no ambiguity about what secret key to use for decryption. This is divorced from what occurs in practice, such as in key management services, where a message recipient can store numerous keys and must identify the correct key before decrypting. To date there has been no formal investigation of their security properties or efficacy, and the ad hoc solutions for identifying the intended key deployed in practice can be inefficient and, in some cases, vulnerable to practical attacks. We provide the first formalization of nonce-based AEAD that supports key identification (AEAD-KI). Decryption now takes in a vector of secret keys and a ciphertext and must both identify the correct secret key and decrypt the ciphertext. We provide new formal security definitions, including new key robustness definitions and indistinguishability security notions. Finally, we show several different approaches for AEAD-KI and prove their security.
引用
收藏
页码:181 / 209
页数:29
相关论文
共 30 条
  • [1] Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
  • [2] Albertini A., 2022, USENIX SECURITY
  • [3] [Anonymous], 2020, IMPR CLIENT SID ENCR
  • [4] [Anonymous], 2015, PKCS 11 CRYPT TOK IN
  • [5] ANSI, 2009, X92412009 ANSI
  • [6] aws.amazon, Amazon web services
  • [7] azure.microsoft, MICR KEY VAULT
  • [8] Pseudorandom functions revisited: The cascade construction and its concrete security
    Bellare, M
    Canetti, R
    Krawczyk, H
    [J]. 37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, : 514 - 523
  • [9] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
  • [10] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875