2017
DOI: 10.1007/978-3-319-56614-6_14
|View full text |Cite
|
Sign up to set email alerts
|

Public-Seed Pseudorandom Permutations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…The notion of universal computational extractors (UCE) [BHK13,ST17] was originally proposed as a way of capturing "random-oracle like" security properties of hash functions via a standard-model definition. While the format of the UCE definition is also given in terms of an extraction game with a source and a distinguisher, there are major differences between the UCE definition and that of ED-Extractors, both in terms of their syntactic structure, but also more conceptually in terms of what they aim to capture.…”
Section: Universal Computational Extractors (Uce)mentioning
confidence: 99%
“…The notion of universal computational extractors (UCE) [BHK13,ST17] was originally proposed as a way of capturing "random-oracle like" security properties of hash functions via a standard-model definition. While the format of the UCE definition is also given in terms of an extraction game with a source and a distinguisher, there are major differences between the UCE definition and that of ED-Extractors, both in terms of their syntactic structure, but also more conceptually in terms of what they aim to capture.…”
Section: Universal Computational Extractors (Uce)mentioning
confidence: 99%
“…Sponge-based PRNG (Sponge-PRBG) constructions offer a great flexibility due to their simplicity, security relying on indifferentiability of the underlying permutation, and efficient hardware/software implementations, which can be flexibly configured to a PRBG. After the sponge-based construction by Bertoni et al [BDPVA10], several variants of spongebased PRBG have been proposed, with improved security and robustness under different security models, e.g., [GT16,ST17,Hut17,CDKT19]. The construction of the seeded PRBG proposed by Gazi and Tessaro [GT16] provides robustness and forward secrecy guarantees, however, this construction incurs an extra hardware cost of r XOR gates, needs an additional source of weak randomness and an extra call to the underlying permutation.…”
Section: Sponge-based Prbg From Wagementioning
confidence: 99%
“…1. Determine two random permutations Peach of size n using any public seed pseudorandom permutation algorithm (also called key-based pseudorandom permutation algorithm), such as the algorithms in [28,29].In this case, we determine two permutations, one for SGAS-SM channel (PS) and the other for SM-SMO channel (PO). The seed for the permutation is the hash of the string produced from concatenated the relative parameters, such that:…”
Section: Dna-based Cryptography Keymentioning
confidence: 99%