2010
DOI: 10.1007/978-3-642-14623-7_36
|View full text |Cite
|
Sign up to set email alerts
|

Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks

Abstract: Abstract. This paper fills an important foundational gap with the first proofs, under standard assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich and relevant forms of relatedkey attack (RKA). An RKA allows the adversary to query the function not only under the target key but under other keys derived from it in adversary-specified ways. Based on the Naor-Reingold PRF we obtain an RKA-PRF whose keyspace is a group and that is proven, under DDH, to resist attacks in which the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

6
157
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 92 publications
(163 citation statements)
references
References 55 publications
(93 reference statements)
6
157
0
Order By: Relevance
“…We now define a sufficient set of restrictions on oracle RKD sets that allow us to prove a ROM analogue of the result by Bellare and Cash [3]. Intuitively the restrictions are strong enough to rule out attacks that follow the above pattern.…”
Section: The Random-oracle Transformmentioning
confidence: 99%
See 4 more Smart Citations
“…We now define a sufficient set of restrictions on oracle RKD sets that allow us to prove a ROM analogue of the result by Bellare and Cash [3]. Intuitively the restrictions are strong enough to rule out attacks that follow the above pattern.…”
Section: The Random-oracle Transformmentioning
confidence: 99%
“…We call this the "Hash-then-PRP" transform. Bellare and Cash [3,Theorem 6.1] prove the soundness of this approach in the standard model for a restricted class of RKD functions, when the hash function is replaced by an RKA-secure pseudorandom generator. At first sight it appears that the ideal hash function (i.e., the random oracle) should be a valid instantiation of this construction.…”
Section: The Random-oracle Transformmentioning
confidence: 99%
See 3 more Smart Citations