Abstract
Related-Key Attacks (RKAs) allow an adversary to observe the outcomes of a cryptographic primitive under not only its original secret key e.g., s, but also a sequence of modified keys φ(s), where φ is specified by the adversary from a class Φ of so-called Related-Key Derivation (RKD) functions. This paper extends the notion of non-malleable Key Derivation Functions (nm-KDFs), introduced by Faust et al. (EUROCRYPT’14), to continuous nm-KDFs. Continuous nm-KDFs have the ability to protect against any a-priori unbounded number of RKA queries, instead of just a single time tampering attack as in the definition of nm-KDFs. Informally, our continuous non-malleability captures the scenario where the adversary can tamper with the original secret key repeatedly and adaptively. We present a novel construction of continuous nm-KDF for any polynomials of bounded degree over a finite field. Essentially, our result can be extended to richer RKD function classes possessing properties of high output entropy and input-output collision resistance. The technical tool employed in the construction is the one-time lossy filter (Qin et al. ASIACRYPT’13) which can be efficiently obtained under standard assumptions, e.g., DDH and DCR. We propose a framework for constructing Φ-RKA-secure IBE, PKE and signature schemes, using a continuous nm-KDF for the same Φ-class of RKD functions. Applying our construction of continuous nm-KDF to this framework, we obtain the first RKA-secure IBE, PKE and signature schemes for a class of polynomial RKD functions of bounded degree under standard assumptions. While previous constructions for the same class of RKD functions all rely on non-standard assumptions, e.g., d-extended DBDH assumption.
Original language | English |
---|---|
Title of host publication | Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings |
Editors | Jonathan Katz |
Publisher | Springer-Verlag London Ltd. |
Pages | 557-578 |
Number of pages | 22 |
ISBN (Electronic) | 9783662464465 |
DOIs | |
Publication status | Published - 2015 |
Externally published | Yes |
Event | International Conference on Practice and Theory in Public Key Cryptography 2015 - Gaithersburg, United States of America Duration: 30 Mar 2015 → 1 Apr 2015 Conference number: 18th https://link.springer.com/book/10.1007/978-3-662-46447-2 (Proceedings) https://www.iacr.org/workshops/pkc2015/ (Proceedings) |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 9020 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | International Conference on Practice and Theory in Public Key Cryptography 2015 |
---|---|
Abbreviated title | PKC 2015 |
Country/Territory | United States of America |
City | Gaithersburg |
Period | 30/03/15 → 1/04/15 |
Internet address |
|
Keywords
- Non-malleable key derivation
- One-time lossy filter
- Related-key attacks