Succinctly-Committing Authenticated Encryption

被引:0
|
作者
Bellare, Mihir [1 ]
Hoang, Viet Tung [2 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
关键词
SECURITY; MODE; EAX;
D O I
10.1007/978-3-031-68385-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent attacks and applications have led to the need for symmetric encryption schemes that, in addition to providing the usual authenticity and privacy, are also committing. In response, many committing authenticated encryption schemes have been proposed. However, all known schemes, in order to provide s bits of committing security, suffer an expansion-this is the length of the ciphertext minus the length of the plaintext-of 2s bits. This incurs a cost in bandwidth or storage. (We typically want s = 128, leading to 256-bit expansion.) However, it has been considered unavoidable due to birthday attacks. We show how to bypass this limitation. We give authenticated encryption (AE) schemes that provide s bits of committing security, yet suffer expansion only around s as long as messages are long enough, namely more than s bits. We call such schemes succinct. We do this via a generic, ciphertext-shortening transform called SC: given an AE scheme with 2s-bit expansion, SC returns an AE scheme with s-bit expansion while preserving committing security. SC is very efficient; an AES-based instantiation has overhead just two AES calls. As a tool, SC uses a collision-resistant invertible PRF called HtM, that we design, and whose analysis is technically difficult. To add the committing security that SC assumes to a base scheme, we also give a transform CTY that improves Chan and Rogaway's CTX. Our results hold in a general framework for authenticated encryption that includes both classical AEAD and AE2 (also called nonce-hiding AE) as special cases, so that we in particular obtain succinctly-committing AE schemes for both these settings.
引用
收藏
页码:305 / 339
页数:35
相关论文
共 50 条
  • [1] On Committing Authenticated-Encryption
    Chan, John
    Rogaway, Phillip
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 275 - 294
  • [2] Efficient Schemes for Committing Authenticated Encryption
    Bellare, Mihir
    Hoang, Viet Tung
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
  • [3] Compactly Committing Authenticated Encryption Made Simpler
    Hirose, Shoichi
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2025, E108A (03) : 183 - 192
  • [4] Message Franking via Committing Authenticated Encryption
    Grubbs, Paul
    Lu, Jiahui
    Ristenpart, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III, 2017, 10403 : 66 - 97
  • [5] Constructing Committing and Leakage-Resilient Authenticated Encryption
    Struck, Patrick
    Weishaeupl, Maximiliane
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 497 - 528
  • [6] Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
    Hirose, Shoichi
    NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 : 187 - 206
  • [7] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
    Hirose, Shoichi
    Minematsu, Kazuhiko
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 233 - 252
  • [8] KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 318 - 347
  • [9] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [10] The Emergence of Authenticated Encryption
    Rogaway, Phillip
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479