DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Wonseok | ko |
dc.contributor.author | Lee, Byeonghak | ko |
dc.contributor.author | Lee, Yeongmin | ko |
dc.contributor.author | Lee, Jooyoung | ko |
dc.date.accessioned | 2021-01-28T06:05:55Z | - |
dc.date.available | 2021-01-28T06:05:55Z | - |
dc.date.created | 2021-01-04 | - |
dc.date.created | 2021-01-04 | - |
dc.date.issued | 2020-12-08 | - |
dc.identifier.citation | 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, pp.697 - 723 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/280108 | - |
dc.description.abstract | In this paper, we prove that the nonce-based enhanced hash-then-mask MAC (nEHtM) is secure up to 2^{3n/4} MAC queries and 2^n verification queries (ignoring logarithmic factors) as long as the number of faulty queries \mu is below 2^{3n/8}, significantly improving the previous bound by Dutta et al. Even when \mu goes beyond 2^{3n/8}, nEHtM enjoys graceful degradation of security. The second result is to prove the security of PRF-based nEHtM; when nEHtM is based on an n-to-s bit random function for a fixed size s such that 1 <= s <= n, it is proved to be secure up to any number of MAC queries and 2^s verification queries, if (1) s = n and \mu < 2^{n/2} or (2) n/2 < s < 2^{n-s} and \mu < max{2^{s/2}, 2^{n-s}}, or (3) s <= n/2 and \mu < 2^{n/2}. This result leads to the security proof of truncated nEHtM that returns only s bits of the original tag since a truncated permutation can be seen as a pseudorandom function. In particular, when s <= 2n/3, the truncated nEHtM is secure up to 2^{n - s/2} MAC queries and 2^s verification queries as long as \mu < min{2^{n/2}, 2^{n-s}}. For example, when s = n/2 (resp. s = n/4), the truncated nEHtM is secure up to 2^{3n/4} (resp. 2^{7n/8}) MAC queries. So truncation might provide better provable security than the original nEHtM with respect to the number of MAC queries. | - |
dc.language | English | - |
dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
dc.title | Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs | - |
dc.type | Conference | - |
dc.identifier.scopusid | 2-s2.0-85097834642 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 697 | - |
dc.citation.endingpage | 723 | - |
dc.citation.publicationname | 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 | - |
dc.identifier.conferencecountry | KO | - |
dc.identifier.conferencelocation | Virtual | - |
dc.identifier.doi | 10.1007/978-3-030-64837-4_23 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.