Indifferentiability of Truncated Random Permutations

被引:12
作者
Choi, Wonseok [1 ]
Lee, Byeonghak [1 ]
Lee, Jooyoung [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Daejeon, South Korea
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I | 2019年 / 11921卷
基金
新加坡国家研究基金会;
关键词
Random permutation; Random function; Truncation; Indifferentiability; Chi-square method; SECURITY;
D O I
10.1007/978-3-030-34578-5_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of natural ways of constructing a pseudorandom function from a pseudorandom permutation is to simply truncate the output of the permutation. When n is the permutation size and m is the number of truncated bits, the resulting construction is known to be indistinguishable from a random function up to 2(n+m/2) queries, which is tight. In this paper, we study the indifferentiability of a truncated random permutation where a fixed prefix is prepended to the inputs. We prove that this construction is (regularly) indifferentiable from a public random function up to min{2(n+m/3), 2(m), 2(l)} queries, while it is publicly indifferentiable up to min{max{2(n+m/3), 2(n2)}, 2(l)} queries, where l is the size of the fixed prefix. Furthermore, the regular indifferentiability bound is proved to be tight when m + l << n. Our results significantly improve upon the previous bound of min{2(m/2), 2(l)} given by Dodis et al. (FSE 2009), allowing us to construct, for instance, an n/2-to-n/2 bit random function that makes a single call to an n-bit permutation, achieving n/2-bit security.
引用
收藏
页码:175 / 195
页数:21
相关论文
共 22 条
  • [11] Hall C, 1998, LECT NOTES COMPUT SC, V1462, P370, DOI 10.1007/BFb0055742
  • [12] Iwata T, 2017, IACR T SYMMETRIC CRY, V2017, P240, DOI 10.13154/tosc.v2017.i4.240-267
  • [13] Indifferentiability of the Sum of Random Permutations Toward Optimal Security
    Lee, Jooyoung
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (06) : 4050 - 4054
  • [14] Lucks S, 2000, LECT NOTES COMPUT SC, V1807, P470
  • [15] Mandal A, 2012, LECT NOTES COMPUT SC, V7194, P285, DOI 10.1007/978-3-642-28914-9_16
  • [16] Mandal A, 2010, LECT NOTES COMPUT SC, V6498, P69, DOI 10.1007/978-3-642-17401-8_6
  • [17] Maurer U, 2004, LECT NOTES COMPUT SC, V2951, P21
  • [18] Mennink Bart, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P313, DOI 10.1007/978-3-030-12612-4_16
  • [19] Mennink Bart, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P619, DOI 10.1007/978-3-319-28166-7_30
  • [20] Patarin J, 2008, LECT NOTES COMPUT SC, V5155, P232