Succinctly-Committing Authenticated Encryption

被引:0
|
作者
Bellare, Mihir [1 ]
Hoang, Viet Tung [2 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
关键词
SECURITY; MODE; EAX;
D O I
10.1007/978-3-031-68385-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent attacks and applications have led to the need for symmetric encryption schemes that, in addition to providing the usual authenticity and privacy, are also committing. In response, many committing authenticated encryption schemes have been proposed. However, all known schemes, in order to provide s bits of committing security, suffer an expansion-this is the length of the ciphertext minus the length of the plaintext-of 2s bits. This incurs a cost in bandwidth or storage. (We typically want s = 128, leading to 256-bit expansion.) However, it has been considered unavoidable due to birthday attacks. We show how to bypass this limitation. We give authenticated encryption (AE) schemes that provide s bits of committing security, yet suffer expansion only around s as long as messages are long enough, namely more than s bits. We call such schemes succinct. We do this via a generic, ciphertext-shortening transform called SC: given an AE scheme with 2s-bit expansion, SC returns an AE scheme with s-bit expansion while preserving committing security. SC is very efficient; an AES-based instantiation has overhead just two AES calls. As a tool, SC uses a collision-resistant invertible PRF called HtM, that we design, and whose analysis is technically difficult. To add the committing security that SC assumes to a base scheme, we also give a transform CTY that improves Chan and Rogaway's CTX. Our results hold in a general framework for authenticated encryption that includes both classical AEAD and AE2 (also called nonce-hiding AE) as special cases, so that we in particular obtain succinctly-committing AE schemes for both these settings.
引用
收藏
页码:305 / 339
页数:35
相关论文
共 50 条
  • [31] Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher
    Chang, Donghoon
    Hasan, Munawar
    IEEE ACCESS, 2024, 12 : 84149 - 84168
  • [32] Cryptanalysis of the EPBC authenticated encryption mode
    Mitchell, Chris J.
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2007, 4887 : 118 - +
  • [33] Research on the Authenticated Encryption Technology in CCSDS
    Gong Chang-Qing
    Yang Ya-Hui
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 321 - 329
  • [34] Disk-Enabled Authenticated Encryption
    Butler, Kevin
    McLaughlin, Stephen
    McDaniel, Patrick
    2010 IEEE 26TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2010,
  • [35] Authenticated encryption schemes with message linkage
    Hwang, SJ
    Chang, CC
    Yang, WP
    INFORMATION PROCESSING LETTERS, 1996, 58 (04) : 189 - 194
  • [36] A novel authenticated encryption scheme with convertibility
    Thadvai, Sandeep
    Tiwari, Deep Narayan
    Jena, Debasish
    Ma, Maode
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 178 - 185
  • [37] Password-authenticated searchable encryption
    Chen, Liqun
    Huang, Kaibin
    Manulis, Mark
    Sekar, Venkkatesh
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 675 - 693
  • [38] Password-authenticated searchable encryption
    Liqun Chen
    Kaibin Huang
    Mark Manulis
    Venkkatesh Sekar
    International Journal of Information Security, 2021, 20 : 675 - 693
  • [39] Hardware Trojan for an Authenticated Encryption Minalpher
    Nozaki, Yusuke
    Ikezaki, Yoshiya
    Yoshikawa, Masaya
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [40] CLOC: Authenticated Encryption for Short Input
    Iwata, Tetsu
    Minematsu, Kazuhiko
    Guo, Jian
    Morioka, Sumio
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 149 - 167