12 Hits in 4.8 sec

Quantum Security of NMAC and Related Constructions [chapter]

Fang Song, Aaram Yun
2017 Lecture Notes in Computer Science  
We prove the security of NMAC, HMAC, AMAC, and the cascade construction with fixed input-length as quantum-secure pseudorandom functions (PRFs).  ...  We first show that a quantumsecure PRF is secure against key-recovery attacks, and remains secure under random leakage of the key.  ...  We would like to thank the anonymous reviewers of Crypto 2017 for many helpful comments.  ... 
doi:10.1007/978-3-319-63715-0_10 fatcat:ibvg5gd6tjec3okyd6wtbkfpsa

Another Look at Tightness II: Practical Issues in Cryptography [chapter]

Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
2017 Lecture Notes in Computer Science  
How to deal with large tightness gaps in security proofs is a vexing issue in cryptography.  ...  We discuss nontightness in connection with complexity leveraging, HMAC, lattice-based cryptography, identity-based encryption, and hybrid encryption.  ...  Acknowledgments We wish to thank Greg Zaverucha for extensive help with Appendix A as well as useful comments on the other sections, Michael Naehrig for reviewing and commenting on §6, Somindu C.  ... 
doi:10.1007/978-3-319-61273-7_3 fatcat:auyw65hh2rfh3k3hphhrf6mcra

Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World [chapter]

Dan Boneh, Mark Zhandry
2013 Lecture Notes in Computer Science  
For encryption, we define security under quantum chosen ciphertext attacks and present both public-key and symmetric-key constructions.  ...  We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA  ... 
doi:10.1007/978-3-642-40084-1_21 fatcat:3ovse3btfjg5xon7tcv46csq2m

A Unified Framework For Quantum Unforgeability [article]

Mina Doosti, Mahshid Delavar, Elham Kashefi, Myrto Arapinis
2021 arXiv   pre-print
We develop a general and parameterised quantum game-based security model unifying unforgeability for both classical and quantum constructions allowing us for the first time to present a complete quantum  ...  On the other hand, we show that PRF is sufficient for constructing a selective unforgeable classical primitive against full quantum adversaries.  ...  [Quantum-Secure Pseudorandom Functions(PRF): [26] ] Let K, X , Y be the key space, the domain and range respectively, all implicitly depending on the security parameter λ.  ... 
arXiv:2103.13994v2 fatcat:7wdgkknnijeiljtss772a2rohi

A Note on the Post-Quantum Security of (Ring) Signatures [article]

Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021 arXiv   pre-print
This work revisits the security of classical signatures and ring signatures in a quantum world.  ...  We present two short signature schemes achieving this notion: one is in the quantum random oracle model, assuming quantum hardness of SIS; and the other is in the plain model, assuming quantum hardness  ...  Fang Song and Aaram Yun. Quantum security of NMAC and related constructions - PRF domain extension against quantum attacks. In Katz and Shacham [KS17], pages 283–309. 2 TSS+ 18.  ... 
arXiv:2112.06078v1 fatcat:potybhcv7nfqbaw4ek5ggiklmu

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher
2020 IACR Transactions on Symmetric Cryptology  
Saturnin is a 256-bit block cipher with a 256-bit key and an additional 9-bit parameter for domain separation.  ...  In this paper, we specify a new block cipher, Saturnin, and its usage in different modes to provide hashing and authenticated encryption in such a way that we can rigorously argue its security in the post-quantum  ...  They are also particularly grateful to Xavier Bonnetain for very helpful discussions and comments, and in particular for an invaluable remark detecting a weakness on a preliminary version of Saturnin.  ... 
doi:10.13154/tosc.v2020.is1.160-207 dblp:journals/tosc/CanteautDLNPPS20 fatcat:jbovqcc6k5gvtopwgxcmadggd4

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60.  ...  for editorial corrections and comments.  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

KEM Combiners [chapter]

Federico Giacon, Felix Heuer, Bertram Poettering
2018 Lecture Notes in Computer Science  
In light of the recent NIST call for post-quantum secure PKE, the zoo of KEMs that are believed to be secure continues to grow.  ...  As building blocks our constructions use cryptographic hash functions and blockciphers.  ...  The reason for the last construction not working is that the linearity of the XOR operation allows for conducting related-key attacks on the PRF, and PRFs in general are not immune against such attacks  ... 
doi:10.1007/978-3-319-76578-5_7 fatcat:bt4zzlp4bfhfbljyze4em2oi5m

Quantum-Access-Secure Message Authentication via Blind-Unforgeability [chapter]

Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2020 Lecture Notes in Computer Science  
and quantum-query-secure pseudorandom functions.  ...  We propose a natural definition of unforgeability against quantum adversaries called blind unforgeability.  ...  Several domain-extension schemes, including NMAC (a.k.a. encrypted cascade), HMAC, and AMAC, can transform a fixed-length qPRF to a qPRF that takes variable-length inputs [24] .  ... 
doi:10.1007/978-3-030-45727-3_27 fatcat:3vdcfx2tyjaxncl4xe6sf3n5le

Quantum-secure message authentication via blind-unforgeability [article]

Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song
2018 arXiv   pre-print
Specifically, we demonstrate a function which is secure according to the existing definition by Boneh and Zhandry, but is clearly vulnerable to a quantum forgery attack, whereby a query supported only  ...  In this work, we uncover serious shortcomings in existing approaches, and propose a new definition. We then support its viability by a number of constructions and characterizations.  ...  We can then invoke a recent result about the quantum-security of domain-extension schemes such as NMAC and HMAC [20] , and obtain variable-length BU-secure MACs from any qPRF. Hash-and-MAC.  ... 
arXiv:1803.03761v2 fatcat:efmdaf2mkfczfiecwxy2c2hgri

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [article]

Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
2021 arXiv   pre-print
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability.  ...  Subsequently, we use our game-playing framework to prove quantum indifferentiability of the sponge construction, assuming a random internal function.  ...  Acknowledgments The authors thank Gorjan Alagic, Andreas Hülsing and Dominique Unruh for enlightening discussions about the superposition oracle technique.  ... 
arXiv:1904.11477v4 fatcat:hlqvigznjnhe3bqls7t6t5n6fe

Cryptographic Primitives that Resist Backdooring and Subversion

Sogol Mazaheri
closely related disciplines to new scenarios but at times also entirely new design and proof techniques.  ...  The Snowden revelations of 2013 have shed some light on the extent of state-performed mass surveillance programs that target people all over the world, violate their privacy, and endanger their cyber security  ...  The above HMAC construction is a secure PRF, since its inner hash chain is a PRF even against backdooring adversaries.  ... 
doi:10.25534/tuprints-00014550 fatcat:ybdjvz3u4fenlcpqrs7rugulcu