Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/181718
Title: Context-committing security of leveled leakage-resilient AEAD
Authors: Dhar, Chandranan
Ethan, Jordan
Jejurikar, Ravindra
Khairallah, Mustafa
List, Eik
Mandal, Sougata
Keywords: Mathematical Sciences
Issue Date: 2024
Source: Dhar, C., Ethan, J., Jejurikar, R., Khairallah, M., List, E. & Mandal, S. (2024). Context-committing security of leveled leakage-resilient AEAD. IACR Transactions On Symmetric Cryptology, 2024(2), 348-370. https://dx.doi.org/10.46586/tosc.v2024.i2.348-370
Journal: IACR Transactions on Symmetric Cryptology 
Abstract: During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key-or context-commitment security. However, the intersection of both fields had been overlooked until very recently. In ToSC 1/2024, Struck and Weishäupl studied generic compositions of encryption schemes and message authentication codes for building committing leakage-resilient schemes. They showed that, in general, Encrypt-then-MAC (EtM) and MAC-then-Encrypt (MtE) are not committing while Encrypt-and-MAC (EaM) is, under plausible and weak assumptions on the components. However, real-world schemes are rarely strict blackbox constructions. Instead, while various leakage-resilient schemes follow blueprints inspired by generic compositions, they often tweak them for security or efficiency. In this paper, we study two blueprints, the first one based on EtM for one of the strongest possible levels of leakage resilience. The second one is a single-pass framework based on leveled implementations. We show that, with a careful selection of the underlying primitives such as with identical encryption and authentication keys and a collision-resistant PRF as the MAC, these blueprints are committing. Our results do not contradict the results by Struck and Weishäupl since we pose more, but practically-motivated, requirements on the components. We demonstrate the practical relevance of our results by showing that our results on those blueprints allow us to easily derive proofs that several state-of-the-art leakage-resilient schemes are indeed committing, including TEDT and its descendants TEDT2 and Romulus-T, as well as the single-pass scheme Triplex.
URI: https://hdl.handle.net/10356/181718
ISSN: 2519-173X
DOI: 10.46586/tosc.v2024.i2.348-370
Schools: School of Physical and Mathematical Sciences 
Rights: © 2024 Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal. Licensed under Creative Commons License CC-BY 4.0.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles

Files in This Item:
File Description SizeFormat 
ToSC2024_2_13.pdf684.52 kBAdobe PDFThumbnail
View/Open

Page view(s)

40
Updated on Mar 16, 2025

Download(s)

10
Updated on Mar 16, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.