POEx: A Beyond-Birthday-Bound-Secure On-Line Cipher ArcticCrypt - - PowerPoint PPT Presentation

poex a beyond birthday bound secure on line cipher
SMART_READER_LITE
LIVE PREVIEW

POEx: A Beyond-Birthday-Bound-Secure On-Line Cipher ArcticCrypt - - PowerPoint PPT Presentation

POEx: A Beyond-Birthday-Bound-Secure On-Line Cipher ArcticCrypt 2016 Christian Forler 1 Eik List 2 Stefan Lucks 2 Jakob Wenzel 2 1 Hochschule Schmalkalden, 2 Bauhaus-Universitt Weimar eik.list (at) uni-weimar.de 18 July 2016 18 July 2016


slide-1
SLIDE 1

POEx: A Beyond-Birthday-Bound-Secure On-Line Cipher

ArcticCrypt 2016 Christian Forler1 Eik List2 Stefan Lucks2 Jakob Wenzel2

1 Hochschule Schmalkalden, 2 Bauhaus-Universität Weimar

eik.list (at) uni-weimar.de

18 July 2016

Eik List POEx 18 July 2016 1/27

slide-2
SLIDE 2

Agenda

1 Motivation 2 POEx 3 Proof Ideas 4 Instantiation 5 Summary

Eik List POEx 18 July 2016 2/27

slide-3
SLIDE 3

Section 1 Motivation

Eik List POEx 18 July 2016 3/27

slide-4
SLIDE 4

On-Line Ciphers

[Bellare et al., 2001]

M1 Mp Mp+1 Mp+2 C1 Cp Cp+1 Cp+2 EK EK EK EK . . . . . . . . . M1 Mp C1 Cp EK EK EK EK . . . . . . . . . M ′

p+1

M ′

p+2

C′

p+1

C′

p+2

On-line cipher:

Every Ci depends only on M1, . . . , Mi [Boldyreva and Taesombut, 2004]: Constant latency and memory

Eik List POEx 18 July 2016 4/27

slide-5
SLIDE 5

On-Line Ciphers

[Bellare et al., 2001]

M1 Mp Mp+1 Mp+2 C1 Cp Cp+1 Cp+2 EK EK EK EK . . . . . . . . . M1 Mp C1 Cp EK EK EK EK . . . . . . . . . M ′

p+1

M ′

p+2

C′

p+1

C′

p+2

On-line cipher:

Every Ci depends only on M1, . . . , Mi [Boldyreva and Taesombut, 2004]: Constant latency and memory

Length-preserving

Eik List POEx 18 July 2016 4/27

slide-6
SLIDE 6

On-Line Ciphers

[Bellare et al., 2001]

M1 Mp Mp+1 Mp+2 C1 Cp Cp+1 Cp+2 EK EK EK EK . . . . . . . . . M1 Mp C1 Cp EK EK EK EK . . . . . . . . . M ′

p+1

M ′

p+2

C′

p+1

C′

p+2

On-line cipher:

Every Ci depends only on M1, . . . , Mi [Boldyreva and Taesombut, 2004]: Constant latency and memory

Length-preserving Prefix-preserving

p ← LLCPn(M, M ′): Length (in blocks) of longest common prefix Ci = C′

i, for all 1 ≤ i ≤ p

Cp+1 = C′

p+1

Ci, C′

i independent for all i > p + 1

Eik List POEx 18 July 2016 4/27

slide-7
SLIDE 7

Notions: SOPRP-Security

[Bellare et al., 2001]

A EK DK P P −1 P և OPermn K և K

Eik List POEx 18 July 2016 5/27

slide-8
SLIDE 8

Limitation: Birthday Bound

EK EK EK HL M1 M2 Mm C0 C1 C2 Cm . . . HCBC1

  • EK
  • EK
  • EK

M1 M2 Mm 0n C1 C2 Cm . . . TC3 EK EK EK HL HL M1 M2 Mm 0n 0n C1 C2 Cm . . . HPCBC EK EK EK HL HL M1 M2 Mm 0n 0n C1 C2 Cm . . . MHCBC EK EK EK EK EK EK EK EK M1 M2 Mm 0n 1 C1 C2 Cm K1 K1 K1 . . . MHCBC

(S)OPRP security requires dependency of previous block = ⇒ chaining All of the above: n-bit chaining value (bottleneck: collision) Birthday bound: security lost after 2n/2 blocks encrypted under the same key Interesting problem in practice and theory

Eik List POEx 18 July 2016 6/27

slide-9
SLIDE 9

Application: On-Line Authenticated Encryption Schemes

Relevance: High-throughput/low-latency requirements,

  • e. g. Optical Transport Networks [ITU-T, 2009]

Stream-oriented interfaces in implementations, e. g. EVP_DecryptUpdate in OpenSSL [Young and Hudson, 2011] Output (part of) the result before all input parts are fully processed

Eik List POEx 18 July 2016 7/27

slide-10
SLIDE 10

Application: On-Line Authenticated Encryption Schemes

Relevance: High-throughput/low-latency requirements,

  • e. g. Optical Transport Networks [ITU-T, 2009]

Stream-oriented interfaces in implementations, e. g. EVP_DecryptUpdate in OpenSSL [Young and Hudson, 2011] Output (part of) the result before all input parts are fully processed 2nd-Round BC-Based Robust On-Line CAESAR Candidates: AES-JAMBU, COLM (AES-COPA + ELmD), POET, SHELL

Eik List POEx 18 July 2016 7/27

slide-11
SLIDE 11

Application: On-Line Authenticated Encryption Schemes

Relevance: High-throughput/low-latency requirements,

  • e. g. Optical Transport Networks [ITU-T, 2009]

Stream-oriented interfaces in implementations, e. g. EVP_DecryptUpdate in OpenSSL [Young and Hudson, 2011] Output (part of) the result before all input parts are fully processed 2nd-Round BC-Based Robust On-Line CAESAR Candidates: AES-JAMBU, COLM (AES-COPA + ELmD), POET, SHELL Inherit birthday-bound limitation

Eik List POEx 18 July 2016 7/27

slide-12
SLIDE 12

Approaches for Higher (Provable) Security

1 Instantiation with wide-block primitive 2 Sponges 3 BBB-secure design

Eik List POEx 18 July 2016 8/27

slide-13
SLIDE 13

Alternative Approaches

  • 1. Instantiation with Wide-Block Primitive
  • EK
  • EK
  • EK

M1 M2 Mm 0n C1 C2 Cm . . . Example: TC3 [Rogaway and Zhang, 2011] with Prøst permutation or BLAKE2b, keyed and tweaked using Even-Mansour [Even and Mansour, 1991] + Efficient + Simple description and analysis – Technically not beyond-birthday-bound (BBB) (our approach guarantees significantly higher security)

Eik List POEx 18 July 2016 9/27

slide-14
SLIDE 14

Alternative Approaches

  • 2. Sponge

π π π π π M IV K C . . . . . . . . .

E.g. Keyak, Ketje, NORX, PRIMATEs, StriBOB, . . . + High security margin

  • Not fully as efficient as block-cipher-based on-line ciphers

– Technically not BBB

Eik List POEx 18 July 2016 10/27

slide-15
SLIDE 15

Section 2 POEx

Eik List POEx 18 July 2016 11/27

slide-16
SLIDE 16

POE

C1 C2 CL EK EK EK HL HL HL HL M1 M2 ML · · · · · · X0 Y0 On-line cipher under POET [Abed et al., 2014] 1 BC call + 2 calls to ǫ-AXU hash function H per block SOPRP-secure POE + PMAC + Tag Splitting: Decryption-misuse-resistant on-line AE scheme POET

Eik List POEx 18 July 2016 12/27

slide-17
SLIDE 17

XTX

C

  • EK

HL M τ n T W V [Minematsu and Iwata, 2015] Tweak-domain extender for tweakable block cipher

  • E : K×{0, 1}τ×{0, 1}n → {0, 1}n

ǫ-AXU hash function H : L×{0, 1}∗ → {0, 1}τ ×{0, 1}n AdvSTPRP

XTX[ E,H],XTX[ E−1,H]−1(A) ≤ ǫ · q2 + AdvSTPRP

  • E,

E−1 (ℓ, O(t)).

Eik List POEx 18 July 2016 13/27

slide-18
SLIDE 18

POEx

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3 XTX chained H: ǫ-AXU hash function

  • E: tweakable block cipher

SOPRP-secure on-line secure up to about O(2n+τ/2) blocks encrypted under same key BBB-secure

Eik List POEx 18 July 2016 14/27

slide-19
SLIDE 19

Section 3 Proof Ideas

Eik List POEx 18 July 2016 15/27

slide-20
SLIDE 20

Proof Ideas

Steps C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Steps:

1 Replace

E by ideal primitive π և TPerm(τ, n)

Eik List POEx 18 July 2016 16/27

slide-21
SLIDE 21

Proof Ideas

Steps C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Steps:

1 Replace

E by ideal primitive π և TPerm(τ, n)

2 Identify bad events

Eik List POEx 18 July 2016 16/27

slide-22
SLIDE 22

Proof Ideas

Steps C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Steps:

1 Replace

E by ideal primitive π և TPerm(τ, n)

2 Identify bad events 3 Study difference between POEx/POEx−1 and P/P −1

w/o bad events: In, directly after, and beyond common prefix

Eik List POEx 18 July 2016 16/27

slide-23
SLIDE 23

Proof Ideas

Steps C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Steps:

1 Replace

E by ideal primitive π և TPerm(τ, n)

2 Identify bad events 3 Study difference between POEx/POEx−1 and P/P −1

w/o bad events: In, directly after, and beyond common prefix

4 Bound probability of bad events

Eik List POEx 18 July 2016 16/27

slide-24
SLIDE 24

Proof Ideas

Bad Events C1 C2 C3

  • π
  • π
  • π

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Bad Events: Consider distinct queries: (M, C) = (M ′, C′), p = LLCPn(M, M ′)

  • Enc. queries: tweak+input collision: (Vi, Xi) = (V ′

j , X′ j)

  • Enc. queries: chaining-value collision: (Xi, Yi) = (X′

j, Y ′ j )

Collisions beyond longest common prefix Two similar bad events for decryption queries

Eik List POEx 18 July 2016 17/27

slide-25
SLIDE 25

Proof Ideas

Bound

C1

  • EK

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

Assuming independent keys K and L ǫ-AXU hash function H AdvSOPRP

POEx[ E,H],POEx[ E−1,H]−1(A) ≤ 2ℓ2ǫ ·

  • 2 +

2τ 2n − ℓ

  • + 2 · AdvSTPRP
  • E,

E−1(ℓ, O(t)).

Eik List POEx 18 July 2016 18/27

slide-26
SLIDE 26

Section 4 Instantiation

Eik List POEx 18 July 2016 19/27

slide-27
SLIDE 27

Instantiation of E

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

TWEAKEY constructions [Jean et al., 2014] Deoxys-BC-128-128 as E

AES-based, software-efficient 128-bit tweak and state

Eik List POEx 18 July 2016 20/27

slide-28
SLIDE 28

Instantiation of E

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

TWEAKEY constructions [Jean et al., 2014] Deoxys-BC-128-128 as E

AES-based, software-efficient 128-bit tweak and state

Various application-specific alternatives possible:

Joltik-BC, Mennink’s designs [Mennink, 2015], ThreeFish [Ferguson et al., 2010], . . .

Eik List POEx 18 July 2016 20/27

slide-29
SLIDE 29

Instantiation of H

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

GF multiplications for H: Poly[n]L(M) :=

m

  • i=1

Lm+1−i · Mi mod pn(x), m/2n-AXU for GF(2n), pn(x): irreducible polynomial in GF(2n) For L = GF(2n) × GF(2τ): Poly[n, τ]L1,L2(M) := (Poly[n]L1(M), Poly[τ]L2(M)).

Eik List POEx 18 July 2016 21/27

slide-30
SLIDE 30

Instantiation of H

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Poly[n, τ] is 4/2n+τ-AXU for 2-block inputs 4 GF multiplications, parallelizable For L = GF(2n) × GF(2τ) and (L1, L2) ∈ L: Wi ← (L2

1 · Xi−1) + (L1 · Yi−1) mod pn(x),

Vi ← (L2

2 · Xi−1) + (L2 · Yi−1) mod pτ(x)

where multiplications and additions are defined over L

Eik List POEx 18 July 2016 22/27

slide-31
SLIDE 31

Instantiation

C1 C2 C3

  • EK
  • EK
  • EK

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

Π := POEx[ E, Poly[n, τ]]. ℓ: #Blocks over all queries Assuming ℓ ≤ 2n−1: AdvSOPRP

Π,Π−1 (A) ≤ 16ℓ2 ·

  • 1

2n+τ + 1 22n

  • + 2 · AdvSTPRP
  • E,

E−1 (ℓ, O(t)).

Eik List POEx 18 July 2016 23/27

slide-32
SLIDE 32

Section 5 Summary

Eik List POEx 18 July 2016 24/27

slide-33
SLIDE 33

Comparison

On-line ciphers OAE schemes Aspect POEx COPE HCBC1 HCBC2 HPCBC MCBC MHCBC POE TC1 TC2 TC3 COLM McOE-G McOE-X OleF #(T)BC calls m 2m m m m + 1 m m m m m m 2m m m 2m #HF calls 2m – m 2m 2m + 1 m 2m 2m – – – – m – – #Keys 2 1 2 2 2 1 2 2 1 1 1 1 2 1 1 HF Key Length n + τ – n 2n 2n – n n – – – – n – – SOPRP-secure

– –

  • BBB

– – – – – – – – – – – – –

Table: • = Provides feature. – = Lacks feature/none.

Eik List POEx 18 July 2016 25/27

slide-34
SLIDE 34

Summary

Features: Based on tweakable block cipher + universal hash function BBB Provably secure if TBC secure

Eik List POEx 18 July 2016 26/27

slide-35
SLIDE 35

Summary

Features: Based on tweakable block cipher + universal hash function BBB Provably secure if TBC secure Current Limitations: Requires tweakable block cipher + universal hash function Pipelinable = sequential calls to TBC 2 keys, 2n-bit hash key

Eik List POEx 18 July 2016 26/27

slide-36
SLIDE 36

Summary

Features: Based on tweakable block cipher + universal hash function BBB Provably secure if TBC secure Current Limitations: Requires tweakable block cipher + universal hash function Pipelinable = sequential calls to TBC 2 keys, 2n-bit hash key Future Work: Extend to a BBB-secure on-line AE scheme

Eik List POEx 18 July 2016 26/27

slide-37
SLIDE 37

Questions? Lunch?

slide-38
SLIDE 38

Section 6 Supporting Slides

Eik List POEx 18 July 2016 1/11

slide-39
SLIDE 39

Bibliography

Abed, F., Forler, C., McGrew, D., List, E., Fluhrer, S., Lucks, S., and Wenzel, J. (2014). Pipelineable On-line Encryption. In Cid, C. and Rechberger, C., editors, FSE, volume 8540 of Lecture Notes in Computer Science, pages 205–223. Springer. Bellare, M., Boldyreva, A., Knudsen, L. R., and Namprempre, C. (2001). Online Ciphers and the Hash-CBC Construction. In Kilian, J., editor, CRYPTO, volume 2139 of Lecture Notes in Computer Science, pages 292–309. Springer. Boldyreva, A. and Taesombut, N. (2004). Online Encryption Schemes: New Security Notions and Constructions. In Okamoto, T., editor, CT-RSA, volume 2964 of Lecture Notes in Computer Science, pages 1–14. Springer. Even, S. and Mansour, Y. (1991). A Construction of a Cipher From a Single Pseudorandom Permutation. In ASIACRYPT, pages 210–224. Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., and Walker, J. (2010). The Skein Hash Function Family. Submission to NIST (Round 3).

Eik List POEx 18 July 2016 2/11

slide-40
SLIDE 40

AXU/Partial-AXU

[Minematsu and Iwata, 2015]

X n τ V W HL X′ n τ V ′ W ′ HL ǫ-AXU : max

X=X′

∆1∈{0,1}τ+n

Pr

L [(V W) ⊕ (V ′ W ′) = ∆1] ≤ ǫ

(n, τ, ǫ)-pAXU : max

X=X′

∆2∈{0,1}n

Pr

L [(V W) ⊕ (V ′ W ′) = (0τ ∆2)] ≤ ǫ

An ǫ-AXU hash function of (n + τ)-bit outputs is also (n, τ, ǫ)-pAXU [Minematsu and Iwata, 2015]

Eik List POEx 18 July 2016 3/11

slide-41
SLIDE 41

Proof Ideas

C1 C2 C3

  • π
  • π
  • π

HL HL HL M1 M2 M3 τ n V1 V2 V3 W1 W2 W3 X0 X1 X2 X3 Y0 Y1 Y2 Y3

1.) Replace E/ E−1 with Random Tweaked Permutation:

  • π և TPerm(τ, n)

Implementable by lazy sampling Difference over ℓ blocks AdvSTPRP

  • E,

E−1 (ℓ, O(t)).

Eik List POEx 18 July 2016 4/11

slide-42
SLIDE 42

Proof Ideas

3.) Behavior without Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

3.1) In Common Prefix: Same (Mi, Xi−1, Yi−1) = ⇒ same Ci

Eik List POEx 18 July 2016 5/11

slide-43
SLIDE 43

Proof Ideas

3.) Behavior without Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

3.1) In Common Prefix: Same (Mi, Xi−1, Yi−1) = ⇒ same Ci Indistinguishable from P

Eik List POEx 18 July 2016 5/11

slide-44
SLIDE 44

Proof Ideas

Behavior without Bad Events

C′

i

  • π

HL M′

i

Vi Wi Xi−1 X′

i

Yi−1 Y′

i

3.2) Directly after Common Prefix: (Xi−1, Yi−1) = (X′

i−1, Y ′ i−1) =

⇒ (Vi−1, Wi−1) = (V ′

i−1, W ′ i−1)

Eik List POEx 18 July 2016 6/11

slide-45
SLIDE 45

Proof Ideas

Behavior without Bad Events

C′

i

  • π

HL M′

i

Vi Wi Xi−1 X′

i

Yi−1 Y′

i

3.2) Directly after Common Prefix: (Xi−1, Yi−1) = (X′

i−1, Y ′ i−1) =

⇒ (Vi−1, Wi−1) = (V ′

i−1, W ′ i−1)

Wi = W ′

i and Mi = M ′ i =

⇒ Xi = X′

i

Eik List POEx 18 July 2016 6/11

slide-46
SLIDE 46

Proof Ideas

Behavior without Bad Events

C′

i

  • π

HL M′

i

Vi Wi Xi−1 X′

i

Yi−1 Y′

i

3.2) Directly after Common Prefix: (Xi−1, Yi−1) = (X′

i−1, Y ′ i−1) =

⇒ (Vi−1, Wi−1) = (V ′

i−1, W ′ i−1)

Wi = W ′

i and Mi = M ′ i =

⇒ Xi = X′

i

Vi = V ′

i and Xi = X′ i =

⇒ Yi = Y ′

i

Eik List POEx 18 July 2016 6/11

slide-47
SLIDE 47

Proof Ideas

Behavior without Bad Events

C′

i

  • π

HL M′

i

Vi Wi Xi−1 X′

i

Yi−1 Y′

i

3.2) Directly after Common Prefix: (Xi−1, Yi−1) = (X′

i−1, Y ′ i−1) =

⇒ (Vi−1, Wi−1) = (V ′

i−1, W ′ i−1)

Wi = W ′

i and Mi = M ′ i =

⇒ Xi = X′

i

Vi = V ′

i and Xi = X′ i =

⇒ Yi = Y ′

i

Wi = W ′

i and Yi = Y ′ i

= ⇒ Ci = C′

i

Eik List POEx 18 July 2016 6/11

slide-48
SLIDE 48

Proof Ideas

Behavior without Bad Events

C′

i

  • π

HL M′

i

Vi Wi Xi−1 X′

i

Yi−1 Y′

i

3.2) Directly after Common Prefix: (Xi−1, Yi−1) = (X′

i−1, Y ′ i−1) =

⇒ (Vi−1, Wi−1) = (V ′

i−1, W ′ i−1)

Wi = W ′

i and Mi = M ′ i =

⇒ Xi = X′

i

Vi = V ′

i and Xi = X′ i =

⇒ Yi = Y ′

i

Wi = W ′

i and Yi = Y ′ i

= ⇒ Ci = C′

i

Indistinguishable from P

Eik List POEx 18 July 2016 6/11

slide-49
SLIDE 49

Proof Ideas

Behavior without Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi 3.3) Beyond Common Prefix: Assuming no bad events: (Xi−1, Yi−1, Mi) = (X′

j−1, Y ′ j−1, M ′ i)

Bounded by max. advantage to distinguish XTX[ π, H] from random permutation [Minematsu and Iwata, 2015] AdvSTPRP

XTX[ π,H],XTX[ π−1,H]−1(ℓ, O(t)) ≤ ǫ · ℓ2

Eik List POEx 18 July 2016 7/11

slide-50
SLIDE 50

Proof Ideas

4.) Probability of Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

bad1 := (Vi = V ′

j ) ∧ (Xi = X′ j)

Definition of pAXU H is ǫ-AXU = ⇒ H is ǫ-pAXU Over at most ℓ blocks of all queries: Pr[bad1] ≤ ǫ · ℓ2/2 Similar argument in decryption direction: bad3 := (Vi = V ′

j ) ∧ (Yi = Y ′ j )

Pr[bad3] ≤ bad1

Eik List POEx 18 July 2016 8/11

slide-51
SLIDE 51

Proof Ideas

4.) Probability of Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

bad2 := (Xi = X′

j) ∧ (Yi = Y ′ j )

Pr[bad1 ∨ bad2] ≤ Pr[bad1] + Pr[¬bad1 ∧ bad2] ¬bad1 ∧ bad2 := ¬[(Vi = V ′

j ) ∧ (Xi = X′ j)]

∧[(Xi = X′

j) ∧ (Yi = Y ′ j )]

¬bad1 ∧ bad2 := (Xi = X′

j) ∧ (Yi = Y ′ j ) ∧ (Vi = V ′ j )

(Vi = V ′

j ) =

⇒ Independent πVi, πV ′

j Eik List POEx 18 July 2016 9/11

slide-52
SLIDE 52

Proof Ideas

4.) Probability of Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

Pr[(Xi = X′

j) ∧ (Yi = Y ′ j ) ∧ (Vi = V ′ j )]

H is ǫ-pAXU: Pr[Xi = X′

j] = Pr[Wi ⊕ W ′ j = Mi ⊕ M ′ j]

≤ 2τ · ǫ since we consider all 2τ − 1 possible Vi = V ′

j

Eik List POEx 18 July 2016 10/11

slide-53
SLIDE 53

Proof Ideas

4.) Probability of Bad Events

C1

  • π

HL Mi Vi Wi Xi−1 Xi Yi−1 Yi

Independent πVi, πV ′

j :

Pr[Yi = Y ′

j |Xi = X′ j ∧ Vi = V ′ j ] ≤

1 2n − ℓ Over ℓ blocks of all queries: Pr[Yi = Y ′

j |Xi = X′ j ∧ Vi = V ′ j ]

· Pr[Xi = X′

j ∧ Vi = V ′ j ]

≤ ℓ2 2 · 2τ · ǫ · 1 2n − ℓ Similar argument in decryption direction

Eik List POEx 18 July 2016 11/11