International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise

Authors:
Joseph Jaeger , Georgia Institute of Technology
Download:
DOI: 10.1007/978-3-031-30620-4_4 (login may be required)
Search ePrint
Search Google
Presentation: Slides
Conference: EUROCRYPT 2023
Abstract: We show that the adaptive compromise security definitions of Jaeger and Tyagi (Crypto '20) cannot be applied in several natural use-cases. These include proving multi-user security from single-user security, the security of the cascade PRF, and the security of schemes sharing the same ideal primitive. We provide new variants of the definitions and show that they resolve these issues with composition. Extending these definitions to the asymmetric settings, we establish the security of the modular KEM/DEM and Fujisaki-Okamoto approaches to public key encryption in the full adaptive compromise setting. This allows instantiations which are more efficient and standard than prior constructions.
BibTeX
@inproceedings{eurocrypt-2023-32931,
  title={Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-031-30620-4_4},
  author={Joseph Jaeger},
  year=2023
}