Folklore, practice and theory of robust combiners

Amir Herzberg

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

Cryptographic schemes are often designed as a combination of multiple component cryptographic modules. Such a combiner design is robust for a (security) specification if it meets the specification, provided that a sufficient subset of the components meet their specifications. A folklore combiner for encryption is cascade, i.e. c= ℰ′′′′(ℰ′′(m)). We show that cascade is a robust combiner for cryptosystems, under three important indistinguishability specifications: chosen plaintext attack (IND-CPA), non-adaptive chosen ciphertext attack (IND-CCA1), and replayable chosen ciphertext attack (IND-rCCA). We also show that cascade is not robust for the important specifications adaptive CCA (IND-CCA2) and generalized CCA (IND-gCCA). The IND-rCCA and IND-gCCA specifications are closely related, and this is an interesting difference between them. All specifications are defined within. We also analyze few other basic and folklore combiners. In particular, we show that the following are robust combiners: the parallel combiner f(x)=f″(x) f′(x) for one-way functions, the XOR-input combiner c= (ℰ″′′(mr),ℰ′′(r)) for cryptosystems, and the copy combiner fk″,k′(m)=f″k″(m)f′k′(m) for integrity tasks such as Message Authentication Codes (MAC) and signature schemes. Cascade is also robust for the hiding property of commitment schemes, and the copy combiner is robust for the binding property, but neither is a robust combiner for both properties. We present (new) robust combiners for commitment schemes; these new combiners can be viewed as a composition of the cascade and the copy combiners. Our combiners are simple, efficient and practical.

Original languageEnglish
Pages (from-to)159-189
Number of pages31
JournalJournal of Computer Security
Volume17
Issue number2
DOIs
StatePublished - 2009

Keywords

  • Applied cryptography
  • Cascade ciphers
  • Commitment schemes
  • Encryption schemes
  • Foundations of cryptography
  • Hash functions
  • Robust combiners

Fingerprint

Dive into the research topics of 'Folklore, practice and theory of robust combiners'. Together they form a unique fingerprint.

Cite this