CryptoDB
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
Authors: |
|
---|---|
Download: |
|
Presentation: | Slides |
Conference: | EUROCRYPT 2023 |
Abstract: | We show that the adaptive compromise security definitions of Jaeger and Tyagi (Crypto '20) cannot be applied in several natural use-cases. These include proving multi-user security from single-user security, the security of the cascade PRF, and the security of schemes sharing the same ideal primitive. We provide new variants of the definitions and show that they resolve these issues with composition. Extending these definitions to the asymmetric settings, we establish the security of the modular KEM/DEM and Fujisaki-Okamoto approaches to public key encryption in the full adaptive compromise setting. This allows instantiations which are more efficient and standard than prior constructions. |
BibTeX
@inproceedings{eurocrypt-2023-32931, title={Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise}, publisher={Springer-Verlag}, doi={10.1007/978-3-031-30620-4_4}, author={Joseph Jaeger}, year=2023 }