On the Full MAC Security of a Double-Piped Mode of Operation
スポンサーリンク
概要
- 論文の詳細を見る
We revisit the double-pipe construction introduced by Lucks at Asiacrypt 2005. Lucks originally studied the construction for iterated hash functions and showed that the approach is effective in improving security against various types of collision and (second-)preimage attacks. Instead, in this paper we apply the construction to the secret-key setting, where the underlying FIL (fixed-input-length) compression function is equipped with a dedicated key input. We make some adjustments to Lucks original design so that now the new mode works with a single key and operates as a domain extension of MACs (message authentication codes). Though more than twice as slow as the Merkle-Damgård construction, the double-piped mode enjoys security strengthened beyond the birthday bound. More specifically, when iterating an FIL-MAC whose output size is n-bit, the new double-piped mode yields an AIL-(arbitrary-input-length-)MAC with security up to O(2n) query complexity. This bound contrasts sharply with the birthday bound of O(2n/2), which was the best MAC security accomplished by earlier constructions.
論文 | ランダム
- Portal imagingを用いた強度変調放射線治療中の呼吸位相取得方法の開発(テーマセッション,撮像技術の与える後処理へのインパクト,医用画像一般)
- 垂直性骨欠損を有する広汎型重度慢性歯周炎患者に対してEMDOGAIN^【○!R】を使用した歯周組織再生療法を行い, 歯科用CTを用い三次元的に解析を行った一症例
- 政府の行革審に期待する
- 決定覆し行革審に総評・槙枝氏(労組の動き)
- ナースリー・ルームにおける1・2・3歳児の運動 : 歩行・平衡調査