首页> 外文会议>International conference on the theory and application of cryptology and information security >Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps
【24h】

Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps

机译:后零化多线性映射的代数XOR-RKA-安全伪随机函数

获取原文

摘要

Due to the vast number of successful related-key attacks against existing block-ciphers, related-key security has become a common design goal for such primitives. In these attacks, the adversary is not only capable of seeing the output of a function on inputs of its choice, but also on related keys. At Crypto 2010, Bellare and Cash proposed the first construction of a pseudorandom function that could provably withstand such attacks based on standard assumptions. Their construction, as well as several others that appeared more recently, have in common the fact that they only consider linear or polynomial functions of the secret key over complex groups. In reality, however, most related-key attacks have a simpler form, such as the XOR of the key with a known value. To address this problem, we propose the first construction of RKA-secure pseudorandom function for XOR relations. Our construction relies on multilinear maps and, hence, can only be seen as a feasibility result. Nevertheless, we remark that it can be instantiated under two of the existing multilinear-map candidates since it does not reveal any encodings of zero. To achieve this goal, we rely on several techniques that were used in the context of program obfuscation, but we also introduce new ones to address challenges that are specific to the related-key-security setting.
机译:由于针对现有分组密码的大量成功的相关密钥攻击,相关密钥安全性已成为此类原语的常见设计目标。在这些攻击中,对手不仅能够在其选择的输入上看到功能的输出,而且还能在相关键上看到其输出。在Crypto 2010上,Bellare和Cash提出了第一个伪随机函数的构造,该伪随机函数可以基于标准假设可证明可承受这种攻击。他们的结构以及最近出现的其他几个结构的共同点是,它们仅考虑复杂组上密钥的线性或多项式函数。但是,实际上,大多数相关的密钥攻击都具有更简单的形式,例如具有已知值的密钥的XOR。为了解决这个问题,我们提出了针对XOR关系的RKA安全伪随机函数的第一个构造。我们的构造依赖于多线性图,因此,只能看作是可行的结果。尽管如此,我们注意到它可以在现有的两个多线性映射候选中的两个下实例化,因为它不显示任何零编码。为了实现此目标,我们依赖于程序混淆环境中使用的几种技术,但是我们还引入了新技术来解决特定于相关密钥安全性设置的挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号