2021
DOI: 10.1007/978-3-030-92075-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Leakage-Resilient MACs Without Idealized Assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…First, we show that the recent LR-MAC1 leakage-resilient MAC proposed as Asiacrypt 2021 [BGPS21] natively offers good features for this purpose that is also fault-resilient. Precisely, its tag verification can be implemented such that only the Tweakable Block Cipher (TBC) that manipulates its long-term secret requires security against leakage and faults.…”
Section: Introductionmentioning
confidence: 92%
See 2 more Smart Citations
“…First, we show that the recent LR-MAC1 leakage-resilient MAC proposed as Asiacrypt 2021 [BGPS21] natively offers good features for this purpose that is also fault-resilient. Precisely, its tag verification can be implemented such that only the Tweakable Block Cipher (TBC) that manipulates its long-term secret requires security against leakage and faults.…”
Section: Introductionmentioning
confidence: 92%
“…The proof is based on the observation that in order to find a fresh and valid pair (m, τ ) against LR-MAC1, the adversary needs to either find a collision against the hash function H, or to find a fresh and valid tuple (tw, x, y) against the SUP-L2 security of TBC F even with the power of injecting faults in tag verification. In the proof, the adversary is deemed to win the game if any of her q V + 1 verification queries can be associated to a valid predication against the TBC F. This is to capture the power of the adversary on tag verification since now the adversary can inject any fault on the hash value h and thus has the full control of the input to the TBC F, which is essentially different from Berti et al's [BGPS21] model where the adversary can only see what h is but cannot modify it. Our analysis implies that the inversion of TBC in tag verification not only helps to improve the security against side-channel attack, but also significantly improves the security against fault attacks.…”
Section: Secure Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Our current security proof relies on the idealized primitives. A standard model-based proof would provide additional confidence (see e.g., [BGPS21]). It might be possible to remove a (pseudo)random property for G as observed by MSGR.…”
Section: Future Workmentioning
confidence: 99%
“…This very first call to Hir inside KDF forces the initial state (h 1 , k 1 ) to diverge for distinct pairs (N, P ) even if some collision on k 0 occurs. For the TGF in Figure 5(B), we borrow the recent LR-MAC due to [BGPS21] which already leverages double-size tweak to get an elegant and simple beyond-birthday authentication mechanism. For checking the validity of the tag in decryption, this LR-MAC relies on the invertibility of the TBC in order to avoid leaking any information on the right tag given any adversarially chosen invalid ciphertexts, as formalized in [BPPS17].…”
Section: Design Blueprintmentioning
confidence: 99%