A measure of dependence for cryptographic primitives relative to ideal functions

3Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

In this work, we present a modification of a well-established measure of dependence appropriate for the analysis of stopping times for adversarial processes on cryptographic primitives. We apply this measure to construct generic criteria for the ideal behavior of fixed functions in both the random oracle and ideal permutation setting. More significantly, we provide a nontrivial extension of the notion of hash function indierentiability, transporting the theory from the status of providing security arguments for protocols utilizing ideal primitives into the more realistic setting of protocol assurance with fixed functions. The methodology this measure introduces to indierentiability analysis connects the security of a hash function with an indierentiable mode to the security of the underlying compression function in a quantitative way; thus, we prove that dependence results on cryptographic primitives provide a direct means of determining the practical resistance or vulnerability of protocols employing such primitives.

Cite

CITATION STYLE

APA

Smith-Tone, D., & Tone, C. (2015). A measure of dependence for cryptographic primitives relative to ideal functions. Rocky Mountain Journal of Mathematics, 45(4), 1283–1309. https://doi.org/10.1216/RMJ-2015-45-4-1283

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free