Security Analysis of CMAC in the Multi-user Model

被引:0
|
作者
Zhang, Xiangyang [1 ]
Shen, Yaobin [2 ]
Wang, Lei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[2] Xiamen Univ, Xiamen 361005, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
CMAC; OMAC1; Multi-User Security; MAC; Message Authentication Code; ARBITRARY-LENGTH MESSAGES; CBC MACS; OMAC; TMAC; BOUNDS; SUM;
D O I
10.1007/978-3-031-75757-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CMAC, also known as OMAC1, is an efficient message authentication code (MAC) and has been standardized by NIST and other organizations. It has been widely applied in IPSec, IKE and many wireless networks. Multi-user security captures a practical scenario where an adversary targets a particular service related to multiple users. Lots of MAC constructions have been rigorously analyzed in the multi-user model. However, the concrete analysis for CMAC in the multi-user model is still a blank in the literature. To fill the gap, we provide a concrete multi-user security bound for CMAC in this paper. Our bound is better than that from generic reduction and we observe that the online security of CMAC in the multi-user model does not degrade from the single-user model.
引用
收藏
页码:67 / 86
页数:20
相关论文
共 50 条
  • [21] A security model for full-text file system search in multi-user environments
    Büttcher, S
    Clarke, CLA
    USENIX ASSOCIATION PROCEEDINGS OF THE 4TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, 2005, : 169 - 182
  • [22] On the security of verifiably encrypted signature schemes in a multi-user setting
    Shim, Kyung-Ah
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (11-12) : 585 - 591
  • [23] More Efficient Digital Signatures with Tight Multi-user Security
    Diemert, Denis
    Gellert, Kai
    Jager, Tibor
    Lyu, Lin
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2021, 12711 LNCS : 1 - 31
  • [24] A Sponge-Based PRF with Good Multi-user Security
    Bhattacharjee, Arghya
    Bhaumik, Ritam
    Nandi, Mridul
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 459 - 478
  • [25] Dynamic security for multi-user access control in distributed environment
    Prakash, S. Jaya
    Kumar, K. Varada Raj
    Nedunuri, Deepak
    INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [26] Multi-user BBB security of public permutations based MAC
    Chen, Yu Long
    Dutta, Avijit
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2022, 14 (05): : 1145 - 1177
  • [27] Multi-user security of the tweakable Even-Mansour cipher
    PingZHANG
    QianYUAN
    HonggangHU
    PengWANG
    Science China(Information Sciences), 2021, 64 (03) : 223 - 225
  • [28] On the security of verifiably encrypted signature schemes in a multi-user setting
    Kyung-Ah Shim
    annals of telecommunications - annales des télécommunications, 2014, 69 : 585 - 591
  • [29] Multi-user security of the tweakable Even-Mansour cipher
    Ping Zhang
    Qian Yuan
    Honggang Hu
    Peng Wang
    Science China Information Sciences, 2021, 64
  • [30] Multi-user BBB security of public permutations based MAC
    Yu Long Chen
    Avijit Dutta
    Mridul Nandi
    Cryptography and Communications, 2022, 14 : 1145 - 1177