2014
DOI: 10.1007/978-3-319-08344-5_20
|View full text |Cite
|
Sign up to set email alerts
|

ELmE: A Misuse Resistant Parallel Authenticated Encryption

Abstract: Abstract. The authenticated encryptions which resist misuse of initial value (or nonce) at some desired level of privacy are two-pass or Macthen-Encrypt constructions (inherently inefficient but provide full privacy) and online constructions, e.g., McOE, sponge-type authenticated encryptions (such as duplex, AEGIS) and COPA. Only the last one is almost parallelizable with some bottleneck in processing associated data. In this paper, we design a new online secure authenticated encryption, called ELmE or Encrypt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
13
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 33 publications
1
13
0
Order By: Relevance
“…5.4, establishing a 2 rn/(r +1) bound for any r , as long as the universal hash function is replaced by a uniform random function, and the adversaries use a limited number of tweaks. In applications where the number of tweaks can be limited to a small number, as might, for example, be the case in certain authenticated encryption schemes [2,26,68], our newly obtained bound on TEM[r ] improves over the state of the art, and even solves the conjecture by Cogliati et al in 2015 [21] for the specific case of uniformly random masking. The replacement of the universal hash function by a uniform random function may in certain settings by a burden, but this condition allows us to make a first step towards solving this conjecture for general masking.…”
Section: Application To Even-mansour and Tweakable Even-mansoursupporting
confidence: 54%
See 1 more Smart Citation
“…5.4, establishing a 2 rn/(r +1) bound for any r , as long as the universal hash function is replaced by a uniform random function, and the adversaries use a limited number of tweaks. In applications where the number of tweaks can be limited to a small number, as might, for example, be the case in certain authenticated encryption schemes [2,26,68], our newly obtained bound on TEM[r ] improves over the state of the art, and even solves the conjecture by Cogliati et al in 2015 [21] for the specific case of uniformly random masking. The replacement of the universal hash function by a uniform random function may in certain settings by a burden, but this condition allows us to make a first step towards solving this conjecture for general masking.…”
Section: Application To Even-mansour and Tweakable Even-mansoursupporting
confidence: 54%
“…On the one hand, the parameter often plays a significant role in the security bounds, while on the other hand, the values and are often close to each other, and differ at most by a multiplicative constant. For example, for COPA [2], ELmE [26], and SCT [68], we have ≈ 2 .…”
Section: Blockciphers and Tweakable Blockciphersmentioning
confidence: 99%
“…This step usually costs Adv srkprp Φ,E (D), where D is some strong related-key PRP distinguisher with a certain amount of resources, usually q queries to the keyed oracle E φ(k) and τ time, and Φ is the set of related-key deriving functions φ that D is allowed to choose. This reduction is in fact also broadly used beyond the area of tweakable blockciphers, such as in authenticated encryption schemes [1,3,11,21,28,33,37,44,50,51] and message authentication codes [4,13,16,24,29,30,41,47,[57][58][59], and in fact, we are not aware of any security result of a construction based on a standard-model blockcipher that uses a structurally different approach. Inspired by this, we investigate what level of tweakable blockcipher security can be achieved if this proof technique is employed.…”
Section: Optimal Security In Standard Model?mentioning
confidence: 99%
“…Such constructions are very efficient as it doesn't use any non-linear functions and the mode is parallelizable. Infact some of the existing constructions like ELmE [2] and COPA [1] uses this kind of structure (EME with Olmix) as the underlying structure to make the construction online, fully pipelined implementable.…”
Section: Application Of Our Resultmentioning
confidence: 99%