Security Analysis of CMAC in the Multi-user Model

被引:0
|
作者
Zhang, Xiangyang [1 ]
Shen, Yaobin [2 ]
Wang, Lei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Xiamen Univ, Xiamen 361005, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
CMAC; OMAC1; Multi-User Security; MAC; Message Authentication Code; ARBITRARY-LENGTH MESSAGES; CBC MACS; OMAC; TMAC; BOUNDS; SUM;
D O I
10.1007/978-3-031-75757-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CMAC, also known as OMAC1, is an efficient message authentication code (MAC) and has been standardized by NIST and other organizations. It has been widely applied in IPSec, IKE and many wireless networks. Multi-user security captures a practical scenario where an adversary targets a particular service related to multiple users. Lots of MAC constructions have been rigorously analyzed in the multi-user model. However, the concrete analysis for CMAC in the multi-user model is still a blank in the literature. To fill the gap, we provide a concrete multi-user security bound for CMAC in this paper. Our bound is better than that from generic reduction and we observe that the online security of CMAC in the multi-user model does not degrade from the single-user model.
引用
收藏
页码:67 / 86
页数:20
相关论文
共 50 条
  • [1] On Multi-user Security of Schnorr Signature in Algebraic Group Model
    Fukumitsu, Masayuki
    Hasegawa, Shingo
    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2022, : 295 - 301
  • [2] The Multi-user Security of Double Encryption
    Viet Tung Hoang
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 381 - 411
  • [3] Multi-user security bound for filter permutators in the random oracle model
    Benoît Cogliati
    Titouan Tanguy
    Designs, Codes and Cryptography, 2019, 87 : 1621 - 1638
  • [4] Multi-user security bound for filter permutators in the random oracle model
    Cogliati, Benoit
    Tanguy, Titouan
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (07) : 1621 - 1638
  • [5] Multi-User Guesswork and Brute Force Security
    Christiansen, Mark M.
    Duffy, Ken R.
    Calmon, Flavio du Pin
    Medard, Muriel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6876 - 6886
  • [6] Security of Signature Schemes in a Multi-User Setting
    Alfred Menezes
    Nigel Smart
    Designs, Codes and Cryptography, 2004, 33 : 261 - 274
  • [7] On Signatures with Tight Security in the Multi-User Setting
    Hanaoka, Goichiro
    Schuldt, Jacob C. N.
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 91 - 95
  • [8] Tight Multi-User Security Bound of DbHtS
    Datta, Nilanjan
    Dutta, Avijit
    Nandi, Mridul
    Talnikar, Suprita
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (01) : 192 - 223
  • [9] Security of signature schemes in a multi-user setting
    Menezes, A
    Smart, N
    DESIGNS CODES AND CRYPTOGRAPHY, 2004, 33 (03) : 261 - 274
  • [10] The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model
    Naito, Yusuke
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 51 - 77