Modeling Random Oracles Under Unpredictable Queries

被引:2
作者
Farshim, Pooya [1 ,2 ]
Mittelbach, Arno [3 ]
机构
[1] PSL Res Univ, ENS, CNRS, Paris, France
[2] PSL Res Univ, INRIA, Paris, France
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
FAST SOFTWARE ENCRYPTION (FSE 2016) | 2016年 / 9783卷
关键词
Random oracle; Unpredictability; UCE; RKA security; KDM security; Zipper Hash; Indifferentiability; Multi-stage security; HASH;
D O I
10.1007/978-3-662-52993-5_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent work, Bellare, Hoang, and Keelveedhi (CRYPTO 2013) introduced a new abstraction called Universal Computational Extractors (UCEs), and showed how they can replace random oracles (ROs) across a wide range of cryptosystems. We formulate a new framework, called Interactive Computational Extractors (ICEs), that extends UCEs by viewing them as models of ROs under unpredictable (aka. high-entropy) queries. We overcome a number of limitations of UCEs in the new framework, and in particular prove the adaptive RKA and semi-adaptive KDM securities of a highly efficient symmetric encryption scheme using ICEs under key offsets. We show both negative and positive feasibility results for ICEs. On the negative side, we demonstrate ICE attacks on the HMAC and NMAC constructions. On the positive side we show that: (1) ROs are indeed ICE secure, thereby confirming the structural soundness of our definition and enabling a finer layered approach to protocol design in the RO model; and (2) a modified version of Liskov's Zipper Hash is ICE secure with respect to an underlying fixed-input-length RO, for appropriately restricted classes of adversaries. This brings the first result closer to practice by moving away from variable-input-length ROs. Our security proofs employ techniques from indifferentiability in multi-stage settings.
引用
收藏
页码:453 / 473
页数:21
相关论文
共 37 条
  • [1] [Anonymous], 1998, P 30 ANN ACM S THEOR
  • [2] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
  • [3] [Anonymous], 2001, Advances in Cryptology-CRYPTO'89 Proceedings
  • [4] Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
  • [5] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
  • [6] Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
  • [7] Bellare M, 2015, 2015487 CRYPT EPRINT
  • [8] Bellare M., 2013, 2013424 CRYPT EPRINT
  • [9] Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
    Bellare, Mihir
    Viet Tung Hoang
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 627 - 656
  • [10] Interactive Message-Locked Encryption and Secure Deduplication
    Bellare, Mihir
    Keelveedhi, Sriram
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 516 - 538