Paper 2024/163

On Tweakable Correlation Robust Hashing against Key Leakages

Chun Guo, Shandong University
Xiao Wang, Northwestern University
Kang Yang, State Key Laboratory of Cryptology
Yu Yu, Shanghai Jiao Tong University
Abstract

We continue the study of blockcipher-based (tweakable) correlation robust hash functions, which are central building blocks of circuit garbling and oblivious-transfer extension schemes. Motivated by Roy (CRYPTO 2022), we first enhance the multi-user tweakable correlation robust notion of Guo et al. (CRYPTO 2020) with a {\it key leaking oracle} that tells the adversary whether a certain user key satisfies the adversarially-chosen predicate. We then investigate the state-of-the-art hash construction of Guo et al. with respect to our new security definition, providing security proof as well as matching attacks. As an application, we exhibit an OT extension protocol with non-trivial multi-user security.

Note: We have noted some errors in the previous version that hinder understanding and verifying the proof. We have corrected them. On the other hand, they don't affect the proven bounds. Meanwhile, we have generalized the multi-user definition to the setting where the u user keys are drawn from different sets, in order to support a further application (that was not mentioned in this paper).

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
Correlation robust hashingkey leakageoblivious-transfer extension
Contact author(s)
chun guo sc @ gmail com
wangxiao @ northwestern edu
yangk @ sklc org
yuyu @ yuyu hk
History
2024-12-05: last of 2 revisions
2024-02-05: received
See all versions
Short URL
https://ia.cr/2024/163
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/163,
      author = {Chun Guo and Xiao Wang and Kang Yang and Yu Yu},
      title = {On Tweakable Correlation Robust Hashing against Key Leakages},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/163},
      year = {2024},
      url = {https://eprint.iacr.org/2024/163}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.