scholarly journals Efficient pseudorandom functions from the decisional linear assumption and weaker variants

Author(s):  
Allison B. Lewko ◽  
Brent Waters
Author(s):  
Kazuhiko Minematsu ◽  
Tetsu Iwata

At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2n, where n denotes the block length of the TBC. In this paper, we falsify the provable security claims by presenting concrete attacks. We show that with the query complexity of O(2n/2), i.e., with the birthday complexity, PMACx, PMAC2x, and SIVx are all insecure.


Author(s):  
Michael J. Freedman ◽  
Yuval Ishai ◽  
Benny Pinkas ◽  
Omer Reingold

2018 ◽  
Vol 31 (4) ◽  
pp. 917-964 ◽  
Author(s):  
Michel Abdalla ◽  
Fabrice Benhamouda ◽  
Alain Passelègue ◽  
Kenneth G. Paterson

1988 ◽  
Vol 17 (2) ◽  
pp. 373-386 ◽  
Author(s):  
Michael Luby ◽  
Charles Rackoff

Sign in / Sign up

Export Citation Format

Share Document