On the Full MAC Security of a Double-Piped Mode of Operation
スポンサーリンク
概要
- 論文の詳細を見る
We revisit the double-pipe construction introduced by Lucks at Asiacrypt 2005. Lucks originally studied the construction for iterated hash functions and showed that the approach is effective in improving security against various types of collision and (second-)preimage attacks. Instead, in this paper we apply the construction to the secret-key setting, where the underlying FIL (fixed-input-length) compression function is equipped with a dedicated key input. We make some adjustments to Lucks original design so that now the new mode works with a single key and operates as a domain extension of MACs (message authentication codes). Though more than twice as slow as the Merkle-Damgård construction, the double-piped mode enjoys security strengthened beyond the birthday bound. More specifically, when iterating an FIL-MAC whose output size is n-bit, the new double-piped mode yields an AIL-(arbitrary-input-length-)MAC with security up to O(2n) query complexity. This bound contrasts sharply with the birthday bound of O(2n/2), which was the best MAC security accomplished by earlier constructions.
論文 | ランダム
- 中性子スピンエコー法によるリラクサー誘電体の格子ダイナミクスの研究
- スピン注入RAM(SPRAM)の動向および多値化技術(不揮発性メモリ,メモリ(DRAM,SRAM,フラッシュ,新規メモリ)技術)
- G6 『数理的にかかわり合う力』を育てる授業の評価研究(G【言語とコミュニケーション】,論文発表の部)
- B8 実際的な数学的活動に関する社会文化的アプローチ研究の理論的枠組みについて(B【問題解決1(問題解決・指導法等)】,論文発表の部)
- 頸動脈内膜剥離術患者における炎症および内皮傷害マーカー