SCIENCE CHINA Information Sciences, Volume 64 , Issue 3 : 139102(2021) https://doi.org/10.1007/s11432-018-9757-4

Multi-user security of the tweakable Even-Mansour cipher

More info
  • ReceivedAug 30, 2018
  • AcceptedJan 14, 2019
  • PublishedDec 3, 2020


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61522210, 61632013).


Appendixes A–C.


[1] Cogliati B, Lampe R, Seurin Y. Tweaking Even-Mansour ciphers. In: Proceedings of the 35th Annual Cryptology Conference, Santa Barbara, 2015. 189--208. Google Scholar

[2] Guo Z Y, Wu W L, Liu R, et al. Multi-key analysis of tweakable Even-Mansour with applications to Minalpher and OPP. IACR Trans Symmetric Cryptol, 2017, 2016: 288--306. Google Scholar

[3] Hoang V T, Tessaro S. Key-alternating ciphers and key-length extension: exact bounds and multi-user security. In: Proceedings of the 36th Annual International Cryptology Conference, Santa Barbara, 2016. Google Scholar

  • Figure 1

    (Color online) Comparison of various security. From left to right: the naive bound of TEM-1 by using the hybrid argument, the bound of TEM-1 by point-wise proximity, the bound of TEM-1 that we derive in Theorem 1, the bound of the single-user security of TEM-1, and the bound of ideal TBC that we derive in Theorem 2. Let $n=128$, $p=q=u$, and $\epsilon=2^{-n}$, where $u$ is the number of users.