A Sponge-Based PRF with Good Multi-user Security

被引:0
|
作者
Bhattacharjee, Arghya [1 ]
Bhaumik, Ritam [1 ,2 ]
Nandi, Mridul [1 ]
机构
[1] Indian Stat Inst, Kolkata, India
[2] Inria, Paris, France
来源
基金
欧洲研究理事会;
关键词
Sponge; Multi-User; PRF; public permutation;
D O I
10.1007/978-3-031-58411-4_21
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Both multi-user PRFs and sponge-based constructions have generated a lot of research interest lately. Dedicated analyses for multi-user security have improved the bounds a long distance from the early generic bounds obtained through hybrid arguments, yet the bounds generally don't allow the number of users to be more than birthday-bound in key-size. Similarly, known sponge constructions suffer from being only birthday-bound secure in terms of their capacity. We present in this paper Muffler, a multi-user PRF built from a random permutation using a full-state sponge with feed-forward, which uses a combination of the user keys and unique user IDs to solve both the problems mentioned by improving the security bounds for multi-user constructions and sponge constructions. For D construction query blocks and T permutation queries, with key-size kappa = n/2 and tag-size tau = n/2 (where n is the state-size or the size of the underlying permutation), both D and T must touch birthday bound in n in order to distinguish Muffler from a random function.
引用
收藏
页码:459 / 478
页数:20
相关论文
共 50 条
  • [1] The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting
    Hirose, Shoichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01) : 270 - 277
  • [2] On the Multi-user Security of LWE-Based NIKE
    Langrehr, Roman
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 33 - 62
  • [3] The Multi-user Security of Double Encryption
    Viet Tung Hoang
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 381 - 411
  • [4] Sponge-Based Authenticated Encryption: Security Against Quantum Attackers
    Janson, Christian
    Struck, Patrick
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 230 - 259
  • [5] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Jovanovic, Philipp
    Luykx, Atul
    Mennink, Bart
    Sasaki, Yu
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2019, 32 (03) : 895 - 940
  • [6] Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
    Philipp Jovanovic
    Atul Luykx
    Bart Mennink
    Yu Sasaki
    Kan Yasuda
    Journal of Cryptology, 2019, 32 : 895 - 940
  • [7] Multi-user BBB security of public permutations based MAC
    Chen, Yu Long
    Dutta, Avijit
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1145 - 1177
  • [8] Multi-user BBB security of public permutations based MAC
    Yu Long Chen
    Avijit Dutta
    Mridul Nandi
    Cryptography and Communications, 2022, 14 : 1145 - 1177
  • [9] SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
    Cassiers, Gaetan
    Guo, Chun
    Pereira, Olivier
    Peters, Thomas
    Standaert, Francois-Xavier
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 67 - 85
  • [10] Multi-User Guesswork and Brute Force Security
    Christiansen, Mark M.
    Duffy, Ken R.
    Calmon, Flavio du Pin
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6876 - 6886