Paper 2014/478
Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks
Benny Applebaum and Eyal Widder
Abstract
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking the primitive with several secret keys which satisfy some known relation. The task of constructing provably RKA secure PRFs (for non-trivial relations) under a standard assumption has turned to be challenging. Currently, the only known provably-secure construction is due to Bellare and Cash (Crypto 2010). This important feasibility result is restricted, however, to linear relations over relatively complicated groups (e.g.,
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Preprint. MINOR revision.
- Keywords
- Related-key Attackspseudo-randomness
- Contact author(s)
- benny applebaum @ gmail com
- History
- 2015-08-30: revised
- 2014-06-21: received
- See all versions
- Short URL
- https://ia.cr/2014/478
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/478, author = {Benny Applebaum and Eyal Widder}, title = {Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/478}, year = {2014}, url = {https://eprint.iacr.org/2014/478} }