Tight Security Analysis of the Public Permutation-Based PMAC_Plus
Avijit Dutta, Institute for Advancing Intelligence, TCG-CREST
Mridul Nandi, Indian Statistical Institute
Suprita Talnikar, Indian Statistical Institute
Abstract
Yasuda proposed a variable input-length PRF in CRYPTO 2011, called , based on an -bit block cipher. is a rate- construction and inherits the well-known parallel network with a low additional cost. However, unlike , is secure roughly up to queries. Zhang et al. proposed \textsf{3kf9} in ASIACRYPT 2012, Naito proposed \textsf{LightMAC_Plus} in ASIACRYPT 2017, and Iwata et al. proposed \textsf{GCM-SIV2} in FSE 2017 -- all of them secure up to around queries. Their structural designs and corresponding security proofs were unified by Datta et al. in their framework {\em Double-block Hash-then-Sum} (\textsf{DbHtS}). Leurent et al. in CRYPTO 2018 and then Lee et al. in EUROCRYPT 2020 established a tight security bound of on \textsf{DbHtS}. That provides security for roughly up to queries is a consequence of this result. In this paper, we propose a public permutation-based variable input-length PRF called . We show that is secure against all adversaries that make at most queries. We also show that the bound is essentially tight. It is of note here that instantiation of each block cipher of with the two-round iterated Even-Mansour cipher can yield a beyond the birthday bound secure PRF based on public permutations. Altogether, the solution incurs permutation calls, whereas our proposal requires only permutation calls, being the maximum number of message blocks.
@misc{cryptoeprint:2022/905,
author = {Avijit Dutta and Mridul Nandi and Suprita Talnikar},
title = {Tight Security Analysis of the Public Permutation-Based {PMAC_Plus}},
howpublished = {Cryptology {ePrint} Archive, Paper 2022/905},
year = {2022},
url = {https://eprint.iacr.org/2022/905}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.