CryptoDB
Mihir Bellare
ORCID: 0000-0002-8765-5573
Publications
Year
Venue
Title
2024
CRYPTO
Succinctly-Committing Authenticated Encryption
Abstract
Recent attacks and applications have led to the need for symmetric encryption schemes that, in addition to providing the usual authenticity and privacy, are also committing. In response, many committing authenticated encryption schemes have been proposed. However, all known schemes, in order to provide s bits of committing security, suffer an expansion---this is the length of the ciphertext minus the length of the plaintext---of 2s bits. This incurs a cost in bandwidth or storage. (We typically want s=128, leading to 256-bit expansion.) However, it has been considered unavoidable due to birthday attacks. We show how to bypass this limitation. We give authenticated encryption (AE) schemes that provide s bits of committing security, yet suffer expansion only around s as long as messages are long enough, namely more than s bits. We call such schemes succinct. We do this via a generic, ciphertext-shortening transform called SC: given an AE scheme with 2s-bit expansion, SC returns an AE scheme with s-bit expansion while preserving committing security. SC is very efficient; an AES-based instantiation has overhead just two AES calls. As a tool, SC uses a collision-resistant invertible PRF called HtM, that we design, and whose analysis is technically difficult. To add the committing security that SC assumes to a base scheme, we also give a transform CTY that improves Chan and Rogaway's CTX. Our results hold in a general framework for authenticated encryption that includes both classical AEAD and AE2 (also called nonce-hiding AE) as special cases, so that we in particular obtain succinctly-committing AE schemes for both these settings.
2024
ASIACRYPT
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange
Abstract
In the multi-user with corruptions (muc) setting there are $n\geq 1$ users, and the goal is to prove that, even in the face of an adversary that adaptively corrupts users to expose their keys, un-corrupted users retain security. This can be considered for many primitives including signatures and encryption. Proofs of muc security, while possible, generally suffer a factor $n$ loss in tightness, which can be large. This paper gives new proofs where this factor is reduced to the number $c$ of corruptions, which in practice is much smaller than $n$. We refer to this as corruption-parametrized muc (cp-muc) security. We give a general result showing it for a class of games that we call local. We apply this to get cp-muc security for signature schemes (including ones in standards and in TLS 1.3) and some forms of public-key and symmetric encryption. Then we give dedicated cp-muc security proofs for some important schemes whose underlying games are not local, including the Hashed ElGamal and Fujisaki-Okamoto KEMs and authenticated key exchange. Finally, we give negative results to show optimality of our bounds.
2024
ASIACRYPT
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs
Abstract
This paper aims to give tight proofs, and thus concrete-security improvements, for protocols for two-party computation. Our first step is to suggest, as target, a simple, indistinguishability-based, concrete-security-friendly definition we call InI. This would of course be a poor choice if InI were weaker than the standard simulation-based definition, but it is not; we show that for functionalities of practical interest like PSI and its variants, the two definitions are equivalent. Based on this, we move forward to study a canonical OPRF-based construction of PSI, giving a tight proof of InI security of the constructed PSI protocol based on the security of the OPRF. This leads us to the concrete security of OPRFs, where we show how different DH-style assumptions on the underlying group yield proofs of different degrees of tightness, including one that is tight, for the well-known and efficient 2H-DH OPRF.
2023
PKC
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
Abstract
We consider a transform, called Derive-then-Derandomize, that hardens a given
signature scheme against randomness failure and implementation error.
We prove that it works. We then give a general lemma showing indifferentiability of a class of constructions that apply a shrinking output transform to an MD-style hash function.
Armed with these tools, we give new proofs for the widely standardized
and used $\EdDSA$ signature scheme, improving prior work in two ways:
(1) we give proofs for the case that the hash function is an MD-style one, reflecting the use of SHA512 in the NIST standard, and (2) we improve the tightness of the reduction so that one has guarantees for group sizes in actual use.
2023
CRYPTO
When Messages are Keys: Is HMAC a dual-PRF?
Abstract
In Internet security protocols including TLS 1.3, KEMTLS, MLS and Noise, HMAC is being assumed to be a dual-PRF, meaning a PRF not only when keyed conventionally (through its first input), but also when "swapped" and keyed (unconventionally) through its second (message) input. We give the first in-depth analysis of the dual-PRF assumption on HMAC. For the swap case, we note that security does not hold in general, but completely characterize when it does; we show that HMAC is swap-PRF secure if and only if keys are restricted to sets satisfying a condition called feasibility, that we give, and that holds in applications. The sufficiency is shown by proof and the necessity by attacks. For the conventional PRF case, we fill a gap in the literature by proving PRF security of HMAC for keys of arbitrary length. Our proofs are in the standard model, make assumptions only on the compression function underlying the hash function, and give good bounds in the multi-user setting. The positive results are strengthened through achieving a new notion of variable key-length PRF security that guarantees security even if different users use keys of different lengths, as happens in practice.
2022
EUROCRYPT
Efficient Schemes for Committing Authenticated Encryption
📺
Abstract
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is a commitment to the key. These are extended, at minimal additional cost, to schemes where the ciphertext is a commitment to all encryption inputs, meaning key, nonce, associated data and message. Our primary schemes are modifications of GCM (for basic, unique-nonce AE security) and AES-GCM-SIV (for misuse-resistant AE security) and add both forms of commitment without any increase in ciphertext size. We also give more generic, but somewhat more costly, solutions.
2022
CRYPTO
Better than Advertised Security for Non-Interactive Threshold Signatures
📺
Abstract
We give a unified syntax, and a hierarchy of definitions of security of increasing strength, for non-interactive threshold signature schemes. These are schemes having a single-round signing protocol, possibly with one prior round of message-independent pre-processing. We fit FROST1 and BLS, which are leading practical schemes, into our hierarchy, in particular showing they meet stronger security definitions than they have been shown to meet so far. We also fit in our hierarchy a more efficient version FROST2 of FROST1 that we give. These definitions and results, for simplicity, all assume trusted key generation. Finally, we prove the security of FROST2 with key generation performed by an efficient distributed key generation protocol.
2021
ASIACRYPT
Chain Reductions for Multi-Signatures and the HBMS Scheme
📺
Abstract
Existing proofs for existing Discrete Log (DL) based multi-signature schemes give only weak guarantees if the schemes are implemented, as they are in practice, in 256-bit groups. This is because the underlying reductions, which are mostly in the standard model and from DL, are loose. We show that relaxing either the model or the assumption suffices to obtain tight reductions. Namely we give (1) tight proofs from DL in the Algebraic Group Model, and (2) tight, standard-model proofs from well-founded assumptions other than DL. We first do this for the classical 3-round schemes, namely $\BN$ and $\MuSig$. Then we give a new 2-round multi-signature scheme, $\MSB$, as efficient as prior ones, for which we do the same. These multiple paths to security for a single scheme are made possible by a framework of chain reductions, in which a reduction is broken into a chain of sub-reductions involving intermediate problems. Overall our results improve the security guarantees for DL-based multi-signature schemes in the groups in which they are implemented in practice.
2020
EUROCRYPT
Security under Message-Derived Keys: Signcryption in iMessage
📺
Abstract
At the core of Apple's iMessage is a SignCryption scheme that involves symmetric encryption of a message under a key that is derived from the message itself. To capture this, we formalize a primitive we call Encryption under Message-Derived Keys (EMDK). We prove security of the EMDK scheme underlying iMessage. We use this to prove security of the SignCryption scheme itself, with respect to definitions of SignCryption we give that enhance prior ones to cover issues peculiar to messaging protocols. Our provable-security results are quantitative, and we discuss the practical implications for iMessage.
2020
EUROCRYPT
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
📺
Abstract
It is convenient and common for schemes in the random oracle model to assume access to multiple random oracles (ROs), leaving to implementations the task --we call it oracle cloning-- of constructing them from a single RO. The first part of the paper is a case study of oracle cloning in KEM submissions to the NIST Post-Quantum Cryptography standardization process. We give key-recovery attacks on some submissions arising from mistakes in oracle cloning, and find other submissions using oracle cloning methods whose validity is unclear. Motivated by this, the second part of the paper gives a theoretical treatment of oracle cloning. We give a definition of what is an "oracle cloning method" and what it means for such a method to "work," in a framework we call read-only indifferentiability, a simple variant of classical indifferentiability that yields security not only for usage in single-stage games but also in multi-stage ones. We formalize domain separation, and specify and study many oracle cloning methods, including common domain-separating ones, giving some general results to justify (prove read-only indifferentiability of) certain classes of methods. We are not only able to validate the oracle cloning methods used in many of the unbroken NIST PQC KEMs, but also able to specify and validate oracle cloning methods that may be useful beyond that.
2019
CRYPTO
Nonces Are Noticed: AEAD Revisited
📺
Abstract
We draw attention to a gap between theory and usage of nonce-based symmetric encryption, under which the way the former treats nonces can result in violation of privacy in the latter. We bridge the gap with a new treatment of nonce-based symmetric encryption that modifies the syntax (decryption no longer takes a nonce), upgrades the security goal (asking that not just messages, but also nonces, be hidden) and gives simple, efficient schemes conforming to the new definitions. We investigate both basic security (holding when nonces are not reused) and advanced security (misuse resistance, providing best-possible guarantees when nonces are reused).
2019
ASIACRYPT
The Local Forking Lemma and Its Application to Deterministic Encryption
Abstract
We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting, the classical Encrypt-with-Hash scheme provides message-recovery security, across a broad range of message distributions. The proof relies on a new variant of the forking lemma in which the random oracle is reprogrammed on just a single fork point rather than on all points past the fork.
2018
PKC
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups
Abstract
We initiate the study of public-key encryption (PKE) schemes and key-encapsulation mechanisms (KEMs) that retain security even when public parameters (primes, curves) they use may be untrusted and subverted. We define a strong security goal that we call ciphertext pseudo-randomness under parameter subversion attack (CPR-PSA). We also define indistinguishability (of ciphertexts for PKE, and of encapsulated keys from random ones for KEMs) and public-key hiding (also called anonymity) under parameter subversion attack, and show they are implied by CPR-PSA, for both PKE and KEMs. We show that hybrid encryption continues to work in the parameter subversion setting to reduce the design of CPR-PSA PKE to CPR-PSA KEMs and an appropriate form of symmetric encryption. To obtain efficient, elliptic-curve-based KEMs achieving CPR-PSA, we introduce efficiently-embeddable group families and give several constructions from elliptic-curves.
2015
JOFC
2015
EUROCRYPT
2014
ASIACRYPT
2012
ASIACRYPT
2012
JOFC
On-line Ciphers and the Hash-CBC Constructions
Abstract
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks.
2009
EUROCRYPT
2009
EUROCRYPT
2008
JOFC
2008
JOFC
2008
CRYPTO
2007
PKC
2005
CRYPTO
2003
EUROCRYPT
2002
EUROCRYPT
2000
ASIACRYPT
2000
ASIACRYPT
2000
ASIACRYPT
Program Committees
- Eurocrypt 2023
- Asiacrypt 2022
- PKC 2018
- Crypto 2017
- Crypto 2013
- Crypto 2011
- TCC 2007
- Asiacrypt 2006
- Crypto 2003
- Crypto 2000 (Program chair)
- Eurocrypt 1999
- Crypto 1996
- Eurocrypt 1995
- Crypto 1993
Coauthors
- Michel Abdalla (6)
- Tolga Acar (1)
- William Aiello (1)
- Ali Aldakheel (1)
- Jee Hea An (3)
- Benedikt Auerbach (1)
- Matilda Backendal (1)
- Mira Belenkiy (1)
- Mihir Bellare (122)
- Daniel J. Bernstein (1)
- Alexandra Boldyreva (8)
- Zvika Brakerski (1)
- Ran Canetti (1)
- David Cash (3)
- Dario Catalano (2)
- Lenore Cowen (1)
- Giovanni Di Crescenzo (1)
- Elizabeth Crites (1)
- Wei Dai (2)
- Hannah Davis (2)
- Anand Desai (2)
- Zoë Diamadi (1)
- Rafael Dowsley (2)
- Marc Fischlin (2)
- Georg Fuchsbauer (2)
- Juan A. Garay (1)
- Oded Goldreich (3)
- Shafi Goldwasser (5)
- Roch Guérin (1)
- Felix Günther (2)
- Shai Halevi (1)
- Viet Tung Hoang (7)
- Dennis Hofheinz (2)
- Joseph Jaeger (1)
- Markus Jakobsson (1)
- Daniel Kane (1)
- Sriram Keelveedhi (6)
- Joe Kilian (1)
- Eike Kiltz (5)
- Lars R. Knudsen (2)
- Tadayoshi Kohno (4)
- Chelsea Komlo (1)
- Hugo Krawczyk (2)
- Ted Krovetz (1)
- Tanja Lange (2)
- Lucy Li (1)
- Mary Maller (1)
- John Malone-Lee (2)
- Sarah Meiklejohn (1)
- Silvio Micali (4)
- Daniele Micciancio (3)
- Rachel Miller (1)
- Sara K. Miner (1)
- Chanathip Namprempre (8)
- Moni Naor (1)
- Gregory Neven (7)
- Ruth Ng (1)
- Maya Nyayapati (1)
- Adam O'Neill (2)
- Pascal Paillier (2)
- Adriana Palacio (4)
- Kenneth G. Paterson (2)
- Chris Peikert (1)
- Krzysztof Pietrzak (1)
- Bertram Poettering (2)
- David Pointcheval (4)
- Tal Rabin (1)
- Rishabh Ranjan (1)
- Doreen Riepel (2)
- Thomas Ristenpart (6)
- Todor Ristov (2)
- Ronald L. Rivest (1)
- Phillip Rogaway (17)
- Amit Sahai (2)
- Alessandra Scafuro (1)
- Matteo Scarlata (1)
- Gil Segev (1)
- Michael Semanko (1)
- Hovav Shacham (1)
- Haixia Shi (2)
- Sarah Shoup (1)
- Asha Camper Singh (1)
- Jessica Staddon (1)
- Douglas Stebila (2)
- Igors Stepanovs (6)
- Björn Tackmann (3)
- Stefano Tessaro (7)
- Susan Thomson (2)
- Salil P. Vadhan (1)
- Alexander Vardy (1)
- Ramarathnam Venkatesan (1)
- David Wagner (1)
- Bogdan Warinschi (1)
- Brent Waters (4)
- Scott Yilek (4)
- Moti Yung (3)
- Yizhao Zhang (1)
- Chenzhi Zhu (1)