2022
DOI: 10.1007/978-3-031-22966-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Multi-user Security of the Sum of Truncated Random Permutations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Enhancing Multi-User Security. Moreover, Gleeok-128 could be interpreted as an instantiation of SoP3-2 proposed by Wonseok, Hwigyeom, Jooyoung and Yeongmin at Asiacrypt 2022 [CKLL22]. To our knowledge, our Gleeok-128 is the first such instantiation with dedicated branches.…”
Section: General Constructionmentioning
confidence: 92%
See 4 more Smart Citations
“…Enhancing Multi-User Security. Moreover, Gleeok-128 could be interpreted as an instantiation of SoP3-2 proposed by Wonseok, Hwigyeom, Jooyoung and Yeongmin at Asiacrypt 2022 [CKLL22]. To our knowledge, our Gleeok-128 is the first such instantiation with dedicated branches.…”
Section: General Constructionmentioning
confidence: 92%
“…The original SoP3-2 takes an independent key for each branch, instead, we use a single key with three different algorithms. If we view each Branch in Gleeok-128 as a tweakable block cipher (TBC) taking a tweak, where each branch takes one of the three possible values, a hybrid argument shows quite strong multi-user security bound (see Table 1 of [CKLL22]). In particular, it has a multi-user bound stronger than that of 2-branch designs -namely the sum of two permutations (SoP2) [DHT17,CKLL22].…”
Section: General Constructionmentioning
confidence: 99%
See 3 more Smart Citations