Abstract
Related-Key Attacks (RKAs) allow an adversary to observe the outcomes of a cryptographic primitive under not only its original secret key e.g., s, but also a sequence of modified keys φ(s), where φ is specified by the adversary from a class Φ of so-called Related-Key Derivation (RKD) functions. This paper extends the notion of non-malleable Key Derivation Functions (nm-KDFs), introduced by Faust et al. (EUROCRYPT’14), to continuous nm-KDFs. Continuous nm-KDFs have the ability to protect against any a-priori unbounded number of RKA queries, instead of just a single time tampering attack as in the definition of nm-KDFs. Informally, our continuous non-malleability captures the scenario where the adversary can tamper with the original secret key repeatedly and adaptively. We present a novel construction of continuous nm-KDF for any polynomials of bounded degree over a finite field. Essentially, our result can be extended to richer RKD function classes possessing properties of high output entropy and input-output collision resistance. The technical tool employed in the construction is the one-time lossy filter (Qin et al. ASIACRYPT’13) which can be efficiently obtained under standard assumptions, e.g., DDH and DCR. We propose a framework for constructing Φ-RKA-secure IBE, PKE and signature schemes, using a continuous nm-KDF for the same Φ-class of RKD functions. Applying our construction of continuous nm-KDF to this framework, we obtain the first RKA-secure IBE, PKE and signature schemes for a class of polynomial RKD functions of bounded degree under standard assumptions. While previous constructions for the same class of RKD functions all rely on non-standard assumptions, e.g., d-extended DBDH assumption.
| Original language | English |
|---|---|
| Title of host publication | Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings |
| Editors | Jonathan Katz |
| Publisher | Springer-Verlag London Ltd. |
| Pages | 557-578 |
| Number of pages | 22 |
| ISBN (Electronic) | 9783662464465 |
| DOIs | |
| Publication status | Published - 2015 |
| Externally published | Yes |
| Event | International Conference on Practice and Theory in Public Key Cryptography 2015 - Gaithersburg, United States of America Duration: 30 Mar 2015 → 1 Apr 2015 Conference number: 18th https://link.springer.com/book/10.1007/978-3-662-46447-2 (Proceedings) https://www.iacr.org/workshops/pkc2015/ (Proceedings) |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer |
| Volume | 9020 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | International Conference on Practice and Theory in Public Key Cryptography 2015 |
|---|---|
| Abbreviated title | PKC 2015 |
| Country/Territory | United States of America |
| City | Gaithersburg |
| Period | 30/03/15 → 1/04/15 |
| Internet address |
|
Keywords
- Non-malleable key derivation
- One-time lossy filter
- Related-key attacks