Succinctly-Committing Authenticated Encryption

被引:0
|
作者
Bellare, Mihir [1 ]
Hoang, Viet Tung [2 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
关键词
SECURITY; MODE; EAX;
D O I
10.1007/978-3-031-68385-5_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent attacks and applications have led to the need for symmetric encryption schemes that, in addition to providing the usual authenticity and privacy, are also committing. In response, many committing authenticated encryption schemes have been proposed. However, all known schemes, in order to provide s bits of committing security, suffer an expansion-this is the length of the ciphertext minus the length of the plaintext-of 2s bits. This incurs a cost in bandwidth or storage. (We typically want s = 128, leading to 256-bit expansion.) However, it has been considered unavoidable due to birthday attacks. We show how to bypass this limitation. We give authenticated encryption (AE) schemes that provide s bits of committing security, yet suffer expansion only around s as long as messages are long enough, namely more than s bits. We call such schemes succinct. We do this via a generic, ciphertext-shortening transform called SC: given an AE scheme with 2s-bit expansion, SC returns an AE scheme with s-bit expansion while preserving committing security. SC is very efficient; an AES-based instantiation has overhead just two AES calls. As a tool, SC uses a collision-resistant invertible PRF called HtM, that we design, and whose analysis is technically difficult. To add the committing security that SC assumes to a base scheme, we also give a transform CTY that improves Chan and Rogaway's CTX. Our results hold in a general framework for authenticated encryption that includes both classical AEAD and AE2 (also called nonce-hiding AE) as special cases, so that we in particular obtain succinctly-committing AE schemes for both these settings.
引用
收藏
页码:305 / 339
页数:35
相关论文
共 50 条
  • [41] Concealment and its applications to authenticated encryption
    Dodis, Y
    An, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 312 - 329
  • [42] Breaking the IOC Authenticated Encryption Mode
    Bottinelli, Paul
    Reyhanitabar, Reza
    Vaudenay, Serge
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 126 - 135
  • [43] AEGIS: A Fast Authenticated Encryption Algorithm
    Wu, Hongjun
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 185 - 201
  • [44] Broadcast Authenticated Encryption with Keyword Search
    Liu, Xueqiao
    He, Kai
    Yang, Guomin
    Susilo, Willy
    Tonien, Joseph
    Huang, Qiong
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 193 - 213
  • [45] Lower bound on linear authenticated encryption
    Jutla, CS
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 348 - 360
  • [46] Cryptanalysis of publicly verifiable authenticated encryption
    Chang, TY
    Yang, CC
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (06) : 1645 - 1646
  • [47] On the security of two authenticated encryption schemes
    Zhang, Jianhong
    Ji, Cheng
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
  • [48] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [49] DLP SPONGE CONSTRUCTION FOR AUTHENTICATED ENCRYPTION
    Hammad, Baraa Tariq
    Jamil, Norziana
    Rusli, Mohd Ezanee
    Zaba, Muhammad Reza
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS: EMBRACING ECO-FRIENDLY COMPUTING, 2017, : 714 - 721
  • [50] Authenticated Encryption Schemes: A Systematic Review
    Jimale, Mohamud Ahmed
    Z'aba, Muhammad Reza
    Kiah, Miss Laiha Binti Mat
    Idris, Mohd Yamani Idna
    Jamil, Norziana
    Mohamad, Moesfa Soeheila
    Rohmad, Mohd Saufy
    IEEE ACCESS, 2022, 10 : 14739 - 14766