2017
DOI: 10.46586/tosc.v2017.i1.449-473
|View full text |Cite
|
Sign up to set email alerts
|

Security of Symmetric Primitives under Incorrect Usage of Keys

Abstract: We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a key-robust scheme does not output ciphertexts/tags that are valid with respect to distinct keys. Key-robustness is a notion that is often tacitly expected/assumed in protocol design — as is the case with anonymous auction, oblivious transfer, or public-key encryption. We formalize simple, yet strong definitions of key robustness for authenticated-encryption, message-authentication codes and PRFs. We show standa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…We show how to build a CmPKE from an mPKE [43] and a key-committing SKE [2,32,33,37], which can itself be built using standard symmetric primitives [2]. Compared to the base mPKE, the overhead is minimal: ct i = ct i , and T is formed of ct 0 and a term of size 2κ bits, which is no larger than a hash digest.…”
Section: 11mentioning
confidence: 99%
See 2 more Smart Citations
“…We show how to build a CmPKE from an mPKE [43] and a key-committing SKE [2,32,33,37], which can itself be built using standard symmetric primitives [2]. Compared to the base mPKE, the overhead is minimal: ct i = ct i , and T is formed of ct 0 and a term of size 2κ bits, which is no larger than a hash digest.…”
Section: 11mentioning
confidence: 99%
“…We also define key commitment for a SKE [33] which roughly states that it is difficult to find two secret keys that correctly decrypt the same ciphertext (to possibly different messages). As in prior works [2,32,33,37], we define this notion by providing the (non-uniform) adversary oracle access to Enc s and Dec s , where we implicitly assume these two algorithms are implemented using an internal hash function modeled as a random oracle.…”
Section: Preliminaries 21 One-time Ind-cca Skementioning
confidence: 99%
See 1 more Smart Citation
“…Roughly speaking, robustness guarantees that it is hard to produce a ciphertext which decrypts validly under two different private keys. Fortunately, it was shown in [28] that composing Kyber.KEM with an appropriately "robust" DEM (as defined in [23]) will result in a robust hybrid PKE scheme. In other words, composing Kyber with a one-time strongly pseudorandom and robust DEM will result in a post-quantum strongly anonymous and robust PKE scheme.…”
mentioning
confidence: 99%
“…As another robustnesses notions, Mohassel[44] defined robustness for key-encapsulation mechanisms, Farshim et al[30] defined robustness for symmetric primitives (authenticated-encryption, message-authentication codes and pseudo-random functions), and Géraud et al[33] defined robustness for functional encryption and digital signatures.…”
mentioning
confidence: 99%