Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs

Cited 0 time in webofscience Cited 2 time in scopus
  • Hit : 252
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorChoi, Wonseokko
dc.contributor.authorLee, Byeonghakko
dc.contributor.authorLee, Yeongminko
dc.contributor.authorLee, Jooyoungko
dc.date.accessioned2021-01-28T06:05:55Z-
dc.date.available2021-01-28T06:05:55Z-
dc.date.created2021-01-04-
dc.date.created2021-01-04-
dc.date.issued2020-12-08-
dc.identifier.citation26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, pp.697 - 723-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10203/280108-
dc.description.abstractIn this paper, we prove that the nonce-based enhanced hash-then-mask MAC (nEHtM) is secure up to 2^{3n/4} MAC queries and 2^n verification queries (ignoring logarithmic factors) as long as the number of faulty queries \mu is below 2^{3n/8}, significantly improving the previous bound by Dutta et al. Even when \mu goes beyond 2^{3n/8}, nEHtM enjoys graceful degradation of security. The second result is to prove the security of PRF-based nEHtM; when nEHtM is based on an n-to-s bit random function for a fixed size s such that 1 <= s <= n, it is proved to be secure up to any number of MAC queries and 2^s verification queries, if (1) s = n and \mu < 2^{n/2} or (2) n/2 < s < 2^{n-s} and \mu < max{2^{s/2}, 2^{n-s}}, or (3) s <= n/2 and \mu < 2^{n/2}. This result leads to the security proof of truncated nEHtM that returns only s bits of the original tag since a truncated permutation can be seen as a pseudorandom function. In particular, when s <= 2n/3, the truncated nEHtM is secure up to 2^{n - s/2} MAC queries and 2^s verification queries as long as \mu < min{2^{n/2}, 2^{n-s}}. For example, when s = n/2 (resp. s = n/4), the truncated nEHtM is secure up to 2^{3n/4} (resp. 2^{7n/8}) MAC queries. So truncation might provide better provable security than the original nEHtM with respect to the number of MAC queries.-
dc.languageEnglish-
dc.publisherSpringer Science and Business Media Deutschland GmbH-
dc.titleImproved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs-
dc.typeConference-
dc.identifier.scopusid2-s2.0-85097834642-
dc.type.rimsCONF-
dc.citation.beginningpage697-
dc.citation.endingpage723-
dc.citation.publicationname26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020-
dc.identifier.conferencecountryKO-
dc.identifier.conferencelocationVirtual-
dc.identifier.doi10.1007/978-3-030-64837-4_23-
dc.contributor.localauthorLee, Jooyoung-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0