logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 3 : 139102(2021) https://doi.org/10.1007/s11432-018-9757-4

Multi-user security of the tweakable Even-Mansour cipher

More info
  • ReceivedAug 30, 2018
  • AcceptedJan 14, 2019
  • PublishedDec 3, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).


Supplement

Appendixes A–C.


References

[1] Cogliati B, Lampe R, Seurin Y. Tweaking Even-Mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference, Santa Barbara, 2015. 189--208. Google Scholar

[2] Guo Z Y, Wu W L, Liu R, et al. Multi-key analysis of tweakable Even-Mansour with applications to Minalpher and OPP. IACR Trans Symmetric Cryptol, 2017, 2016: 288--306. Google Scholar

[3] Hoang V T, Tessaro S. Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. Google Scholar

  • Figure 1

    (Color online) Comparison of various security. From left to right: the naive bound of TEM-1 by using the hybrid argument, the bound of TEM-1 by point-wise proximity, the bound of TEM-1 that we derive in Theorem 1, the bound of the single-user security of TEM-1, and the bound of ideal TBC that we derive in Theorem 2. Let $n=128$, $p=q=u$, and $\epsilon=2^{-n}$, where $u$ is the number of users.