Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Mat. Vopr. Kriptogr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2024, Volume 15, Issue 3, Pages 113–134
DOI: https://doi.org/10.4213/mvk480
(Mi mvk480)
 

Alternative security models for a pseudorandom function

K. D. Tsaregorodtsev

JSC «NPK «Kryptonite», Moscow
References:
Abstract: In the paper we analyze various security models for pseudorandom functions that arise in the analysis of cryptographic protocols (such as 5G-AKA) and study the reducibility of non-standard pseudorandomness models to the standard $\mathsf{PRF}$ model.
We consider several models. (a) $\mathsf{PRF}^+$ model formalizes the following requirement: the outputs of a pseudorandom function on adaptively selected inputs must be indistinguishable from random binary strings of the appropriate length, even if the adversary has the opportunity to receive as “an additional information” the outputs of a “real” pseudorandom function. (b) $\mathsf{UF}$-$\mathsf{PRF}$ model formalizes the requirement that it is impossible to forge the value of a pseudorandom function on a fresh input (similar to the models for the MAC function). (c) $\mathsf{LOR}$-$\mathsf{PRF}$ model formalizes the indistinguishability property of “cryptographic bindings” calculated via pseudorandom function on different keys.
We also study the natural generalization of these models to the case of multiple users in the system ($\mathsf{mPRF}^+$ and $\mathsf{mUF}$-$\mathsf{PRF}$ models). We show that these new models can be reduced to the basic $\mathsf{PRF}$ model for a pseudorandom function family. The results can be used in the analysis of various cryptographic protocols.
Key words: provable security, pseudorandom function.
Received 06.XI.2023
Document Type: Article
UDC: 519.719.2
Language: Russian
Citation: K. D. Tsaregorodtsev, “Alternative security models for a pseudorandom function”, Mat. Vopr. Kriptogr., 15:3 (2024), 113–134
Citation in format AMSBIB
\Bibitem{Tsa24}
\by K.~D.~Tsaregorodtsev
\paper Alternative security models for a pseudorandom function
\jour Mat. Vopr. Kriptogr.
\yr 2024
\vol 15
\issue 3
\pages 113--134
\mathnet{http://mi.mathnet.ru/mvk480}
\crossref{https://doi.org/10.4213/mvk480}
Linking options:
  • https://www.mathnet.ru/eng/mvk480
  • https://doi.org/10.4213/mvk480
  • https://www.mathnet.ru/eng/mvk/v15/i3/p113
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Математические вопросы криптографии
    Statistics & downloads:
    Abstract page:47
    Full-text PDF :2
    References:9
    First page:2
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024