Continuous non-malleable key derivation and its application to related-key security

Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

22 Citations (Scopus)

Abstract

Related-Key Attacks (RKAs) allow an adversary to observe the outcomes of a cryptographic primitive under not only its original secret key e.g., s, but also a sequence of modified keys φ(s), where φ is specified by the adversary from a class Φ of so-called Related-Key Derivation (RKD) functions. This paper extends the notion of non-malleable Key Derivation Functions (nm-KDFs), introduced by Faust et al. (EUROCRYPT’14), to continuous nm-KDFs. Continuous nm-KDFs have the ability to protect against any a-priori unbounded number of RKA queries, instead of just a single time tampering attack as in the definition of nm-KDFs. Informally, our continuous non-malleability captures the scenario where the adversary can tamper with the original secret key repeatedly and adaptively. We present a novel construction of continuous nm-KDF for any polynomials of bounded degree over a finite field. Essentially, our result can be extended to richer RKD function classes possessing properties of high output entropy and input-output collision resistance. The technical tool employed in the construction is the one-time lossy filter (Qin et al. ASIACRYPT’13) which can be efficiently obtained under standard assumptions, e.g., DDH and DCR. We propose a framework for constructing Φ-RKA-secure IBE, PKE and signature schemes, using a continuous nm-KDF for the same Φ-class of RKD functions. Applying our construction of continuous nm-KDF to this framework, we obtain the first RKA-secure IBE, PKE and signature schemes for a class of polynomial RKD functions of bounded degree under standard assumptions. While previous constructions for the same class of RKD functions all rely on non-standard assumptions, e.g., d-extended DBDH assumption.

Original languageEnglish
Title of host publicationPublic-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
EditorsJonathan Katz
PublisherSpringer-Verlag London Ltd.
Pages557-578
Number of pages22
ISBN (Electronic)9783662464465
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventInternational Conference on Practice and Theory in Public Key Cryptography 2015 - Gaithersburg, United States of America
Duration: 30 Mar 20151 Apr 2015
Conference number: 18th
https://link.springer.com/book/10.1007/978-3-662-46447-2 (Proceedings)
https://www.iacr.org/workshops/pkc2015/ (Proceedings)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9020
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Practice and Theory in Public Key Cryptography 2015
Abbreviated titlePKC 2015
Country/TerritoryUnited States of America
CityGaithersburg
Period30/03/151/04/15
Internet address

Keywords

  • Non-malleable key derivation
  • One-time lossy filter
  • Related-key attacks

Cite this