Cryptology ePrint Archive: Report 2017/500

Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps

Michel Abdalla and Fabrice Benhamouda and Alain Passelègue

Abstract: Due to the vast number of successful related-key attacks against existing block-ciphers, related-key security has become a common design goal for such primitives. In these attacks, the adversary is not only capable of seeing the output of a function on inputs of its choice, but also on related keys. At Crypto 2010, Bellare and Cash proposed the first construction of a pseudorandom function that could provably withstand such attacks based on standard assumptions. Their construction, as well as several others that appeared more recently, have in common the fact that they only consider linear or polynomial functions of the secret key over complex groups. In reality, however, most related-key attacks have a simpler form, such as the XOR of the key with a known value. To address this problem, we propose the first construction of RKA secure pseudorandom function for XOR relations. Our construction relies on multilinear maps and, hence, can only be seen as a feasibility result. Nevertheless, we remark that it can be instantiated under two of the existing multilinear-map candidates since it does not reveal any encodings of zero. To achieve this goal, we rely on several techniques that were used in the context of program obfuscation, but we also introduce new ones to address challenges that are specific to the related-key-security setting.

Category / Keywords: Pseudorandom functions, related-key security, multilinear maps, post-zeroizing constructions

Date: received 1 Jun 2017

Contact author: alapasse at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20170601:130820 (All versions of this report)

Short URL: ia.cr/2017/500

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]