In order to design our scheme, we strengthen the connections between the model of Dziembowski et al. and ``pebbling games'', showing that random-oracle-based key evolution schemes are secure as long as the graph of the update function's calls to the oracle has appropriate combinatorial properties. This builds on a connection between pebbling and the random oracle model first established by Dwork, Naor and Wee (CRYPTO 2005). Our scheme's efficiency relies on the existence (which we show) of families of ``local'' bipartite expander graphs of constant degree.
Category / Keywords: secret-key cryptography / Date: received 23 Dec 2013, last revised 24 Dec 2013 Contact author: yxz169 at cse psu edu Available format(s): PDF | BibTeX Citation Version: 20131229:114136 (All versions of this report) Short URL: ia.cr/2013/864 Discussion forum: Show discussion | Start new discussion