2015 IEEE Information Theory Workshop (ITW) 2015
DOI: 10.1109/itw.2015.7133163
|View full text |Cite
|
Sign up to set email alerts
|

Secret-key cryptography from ideal primitives: A systematic overview

Abstract: Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…the usual hardware and power consumption metrics. The main technical contribution of this paper is to introduce a formal ideal primitive model (in the sense of [12]) for KSG-based stream ciphers and to show the sharp 2 3 n-bound for the security of the Lizardconstruction against generic time-memory-data tradeoff attacks.…”
mentioning
confidence: 99%
“…the usual hardware and power consumption metrics. The main technical contribution of this paper is to introduce a formal ideal primitive model (in the sense of [12]) for KSG-based stream ciphers and to show the sharp 2 3 n-bound for the security of the Lizardconstruction against generic time-memory-data tradeoff attacks.…”
mentioning
confidence: 99%
“…Gentry and Ramzan [34] proposed the idea of combining the Feistel construction and the Even-Mansour cipher, which was later named the Key Alternating Feistel (KAF) cipher by Lampe and Seurin [45]. In the work of Gazi and Tessaro [33], a construction that turns RFs into PRF has been introduced. Moreover, the Whitened Swap-or-Not construction by Tessaro [65] provides another way of building nearly optimal n-bits secure PRP from RPs or RFs.…”
Section: Our Contribution In Bigger Perspectivementioning
confidence: 99%
“…of SoP [14,23,51] Indiff. of Feistel [26,27,29] GT [33] K e y A lt e r n a t in g F e is t e l [3 4 , 4 5 ]…”
Section: Our Contribution In Bigger Perspectivementioning
confidence: 99%
“…The general model of computationally distinguishing an idealized cryptosystem from an actual implementation of the system has been proposed in Maurer [9]. A recent overview of the progress in this area is provided in [10].…”
Section: A Related Workmentioning
confidence: 99%