Linicrypt in the Ideal Cipher Model

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We extend the Linicrypt framework for characterizing hash function security as proposed by McQuoid, Swope, and Rosulek (TCC 2018) to support constructions in the ideal cipher model. In this setting, we give a characterization of collision- and second-preimage-resistance in terms of a linear-algebraic condition on Linicrypt programs, and present an efficient algorithm for determining whether a program satisfies the condition. As an application, we consider the case of the block cipher-based hash functions proposed by Preneel, Govaerts, and Vandewall (Crypto 1993), and show that the semantic analysis of PGV given by Black et. al. (J. Crypto. 2010) can be captured as a special case of our characterization.

Cite

CITATION STYLE

APA

Javar, Z., & Kapron, B. M. (2023). Linicrypt in the Ideal Cipher Model. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 14217 LNCS, pp. 91–111). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-45513-1_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free