The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
pandangan teks lengkap
92
Fungsi MAC berasaskan fungsi mampatan dipanggil FMAC telah dibentangkan serta PRF input vektor yang dipanggil vFMAC pada tahun 2016. Ia terbukti sebagai PRF selamat dengan andaian bahawa fungsi mampatan mereka ialah PRF selamat terhadap serangan kunci berkaitan berkenaan. kepada pilih atur bukan kriptografi mereka dalam tetapan pengguna tunggal. Dalam kertas kerja ini, ditunjukkan bahawa kedua-dua FMAC dan vFMAC juga adalah PRF selamat dalam tetapan berbilang pengguna pada andaian yang sama seperti dalam tetapan pengguna tunggal. Keputusan ini membayangkan bahawa keselamatan mereka dalam tetapan berbilang pengguna tidak merosot dengan bilangan pengguna dan sama baiknya dengan tetapan pengguna tunggal.
Shoichi HIROSE
University of Fukui
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Shoichi HIROSE, "The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting" in IEICE TRANSACTIONS on Fundamentals,
vol. E102-A, no. 1, pp. 270-277, January 2019, doi: 10.1587/transfun.E102.A.270.
Abstract: A compression-function-based MAC function called FMAC was presented as well as a vector-input PRF called vFMAC in 2016. They were proven to be secure PRFs on the assumption that their compression function is a secure PRF against related-key attacks with respect to their non-cryptographic permutations in the single user setting. In this paper, it is shown that both FMAC and vFMAC are also secure PRFs in the multi-user setting on the same assumption as in the single user setting. These results imply that their security in the multi-user setting does not degrade with the number of the users and is as good as in the single user setting.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E102.A.270/_p
Salinan
@ARTICLE{e102-a_1_270,
author={Shoichi HIROSE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting},
year={2019},
volume={E102-A},
number={1},
pages={270-277},
abstract={A compression-function-based MAC function called FMAC was presented as well as a vector-input PRF called vFMAC in 2016. They were proven to be secure PRFs on the assumption that their compression function is a secure PRF against related-key attacks with respect to their non-cryptographic permutations in the single user setting. In this paper, it is shown that both FMAC and vFMAC are also secure PRFs in the multi-user setting on the same assumption as in the single user setting. These results imply that their security in the multi-user setting does not degrade with the number of the users and is as good as in the single user setting.},
keywords={},
doi={10.1587/transfun.E102.A.270},
ISSN={1745-1337},
month={January},}
Salinan
TY - JOUR
TI - The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 270
EP - 277
AU - Shoichi HIROSE
PY - 2019
DO - 10.1587/transfun.E102.A.270
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E102-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2019
AB - A compression-function-based MAC function called FMAC was presented as well as a vector-input PRF called vFMAC in 2016. They were proven to be secure PRFs on the assumption that their compression function is a secure PRF against related-key attacks with respect to their non-cryptographic permutations in the single user setting. In this paper, it is shown that both FMAC and vFMAC are also secure PRFs in the multi-user setting on the same assumption as in the single user setting. These results imply that their security in the multi-user setting does not degrade with the number of the users and is as good as in the single user setting.
ER -