Constructing Committing and Leakage-Resilient Authenticated Encryption

Authors

  • Patrick Struck Universität Konstanz, Konstanz, Germany
  • Maximiliane Weishäupl Universität Regensburg, Regensburg, Germany

DOI:

https://doi.org/10.46586/tosc.v2024.i1.497-528

Keywords:

Authenticated Encryption, Committing Security, Leakage Resilience

Abstract

The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes. While the leakage resilience of generic composition schemes has already been analyzed by Barwell et al. (Asiacrypt’17), for committing security this is not the case. We fill this gap by providing a separate analysis of the generic composition paradigms with respect to committing security, giving both positive and negative results: By means of a concrete attack, we show that Encrypt-then-MAC is not committing. Furthermore, we prove that Encrypt-and-MAC is committing, given that the underlying schemes satisfy security notions we introduce for this purpose. We later prove these new notions achievable by providing schemes that satisfy them. MAC-then-Encrypt turns out to be more difficult due to the fact that the tag is not outputted alongside the ciphertext as it is done for the other two composition methods. Nevertheless, we give a detailed heuristic analysis of MAC-then-Encrypt with respect to committing security, leaving a definite result as an open task for future work. Our results, in combination with the fact that only Encrypt-then-MAC yields leakage-resilient AE schemes, show that one cannot obtain AE schemes that are both committing and leakage-resilient via generic composition. As a second approach for constructing committing and leakage-resilient AE, we develop a generic transformation that turns an arbitrary AE scheme into one that fulfills both properties. The transformation relies on a keyed function that is both binding, i.e., it is hard to find key-input pairs that result in the same output, and leakage-resilient pseudorandom.

Downloads

Published

2024-03-01

How to Cite

Struck, P., & Weishäupl, M. (2024). Constructing Committing and Leakage-Resilient Authenticated Encryption. IACR Transactions on Symmetric Cryptology, 2024(1), 497–528. https://doi.org/10.46586/tosc.v2024.i1.497-528

Issue

Section

Articles