喵ID:Ewyjc4免责声明

Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography

基于恒定查询弱 PRF 的 PRF:最小化高效对称密码学的假设

基本信息

DOI:
--
发表时间:
2008
期刊:
International Conference on the Theory and Application of Cryptology and Information Security
影响因子:
--
通讯作者:
Stefano Tessaro
中科院分区:
文献类型:
--
作者: U. Maurer;Stefano Tessaro研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

Although it is well known that all basic private-key cryptographic primitives can be built from one-way functions, finding weak assumptions from which practical implementations of such primitives exist remains a challenging task. Towards this goal, this paper introduces the notion of a constant-query weak PRF , a function with a secret key which is computationally indistinguishable from a truly random function when evaluated at a constant number s of known random inputs, where s can be as small as two. We provide iterated constructions of (arbitrary-input-length) PRFs from constant-query weak PRFs that even improve the efficiency of previous constructions based on the stronger assumption of a weak PRF (where polynomially many evaluations are allowed). One of our constructions directly provides a new mode of operation using a constant-query weak PRF for IND-CPA symmetric encryption which is essentially as efficient as conventional PRF-based counter-mode encryption. Furthermore, our constructions yield efficient modes of operation for keying hash functions (such as MD5 and SHA-1) to obtain iterated PRFs (and hence MACs) which rely solely on the assumption that the underlying compression function is a constant-query weak PRF, which is the weakest assumption ever considered in this context.
尽管众所周知,所有基本的私钥加密原语都可以通过单向功能来构建,但发现这些原始词实际实现的假设较弱仍然是一项艰巨的任务。为了实现这一目标,本文介绍了常数弱PRF的概念,该函数具有秘密键,当以恒定的已知随机输入的常数s评估时,与真正随机的函数在计算上无法区分,其中s可以像小一样小作为两个。 我们提供了(任意输入长度)PRF的迭代构建体,这些构建体来自恒定弱PRF,甚至基于更强的弱PRF假设(在多个方面允许许多评估)基于更强的假设(在多个评估中)提高了先前构建体的效率。 我们的构造中的一种直接使用恒定的弱PRF用于IND-CPA对称加密,提供了一种新的操作模式,该加密本质上与常规的基于PRF的反模式加密效率同样有效。此外,我们的构造产生有效的操作模式,用于键入哈希功能(例如MD5和SHA-1),以获得迭代的PRF(以及MAC),这些PRF(以及MACS)仅依赖于以下假设:基础压缩函数是常数弱弱PRF,这是在这种情况下考虑的最弱的假设。
参考文献
被引文献

数据更新时间:{{ references.updateTime }}

Stefano Tessaro
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓