Paper 2023/1704
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications
Abstract
Security proofs of symmetric-key primitives typically consider an idealized world with access to a (uniformly) random function. The starting point of our work is the observation that such an ideal world can lead to underestimating the actual security of certain primitives. As a demonstrating example,
Note: 1. Change the title. (the previous title was "Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs") 2. Revise the overall structure and improve writing and figures. 3. Add Section 3.2 to discuss applications, including the generic compositions.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- symmetric-key cryptographyprovable securitymulti-user securityxor of permutationsmessage authentication code
- Contact author(s)
-
wonseok @ purdue edu
minkihhan @ kias re kr
yuwei @ purdue edu
vzikas @ cs purdue edu - History
- 2024-03-02: revised
- 2023-11-03: received
- See all versions
- Short URL
- https://ia.cr/2023/1704
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1704, author = {Wonseok Choi and Minki Hhan and Yu Wei and Vassilis Zikas}, title = {On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1704}, year = {2023}, url = {https://eprint.iacr.org/2023/1704} }