International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Constructing Committing and Leakage-Resilient Authenticated Encryption

Authors:
Patrick Struck , Universität Konstanz, Konstanz, Germany
Maximiliane Weishäupl , Universität Regensburg, Regensburg, Germany
Download:
DOI: 10.46586/tosc.v2024.i1.497-528
URL: https://tosc.iacr.org/index.php/ToSC/article/view/11414
Search ePrint
Search Google
Abstract: The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes. While the leakage resilience of generic composition schemes has already been analyzed by Barwell et al. (Asiacrypt’17), for committing security this is not the case. We fill this gap by providing a separate analysis of the generic composition paradigms with respect to committing security, giving both positive and negative results: By means of a concrete attack, we show that Encrypt-then-MAC is not committing. Furthermore, we prove that Encrypt-and-MAC is committing, given that the underlying schemes satisfy security notions we introduce for this purpose. We later prove these new notions achievable by providing schemes that satisfy them. MAC-then-Encrypt turns out to be more difficult due to the fact that the tag is not outputted alongside the ciphertext as it is done for the other two composition methods. Nevertheless, we give a detailed heuristic analysis of MAC-then-Encrypt with respect to committing security, leaving a definite result as an open task for future work. Our results, in combination with the fact that only Encrypt-then-MAC yields leakage-resilient AE schemes, show that one cannot obtain AE schemes that are both committing and leakage-resilient via generic composition. As a second approach for constructing committing and leakage-resilient AE, we develop a generic transformation that turns an arbitrary AE scheme into one that fulfills both properties. The transformation relies on a keyed function that is both binding, i.e., it is hard to find key-input pairs that result in the same output, and leakage-resilient pseudorandom.
BibTeX
@article{tosc-2024-34023,
  title={Constructing Committing and Leakage-Resilient Authenticated Encryption},
  journal={IACR Transactions on Symmetric Cryptology},
  publisher={Ruhr-Universität Bochum},
  volume={024 No. 1},
  pages={497-528},
  url={https://tosc.iacr.org/index.php/ToSC/article/view/11414},
  doi={10.46586/tosc.v2024.i1.497-528},
  author={Patrick Struck and Maximiliane Weishäupl},
  year=2024
}