Enhanced security notions for dedicated-key hash functions: Definitions and relationships17th International Workshop, FSE 2010 Fast Software Entryption, 7-10 February 2, Korea. Lecture Notes in Computer Science
Document TypeConference Paper
AbstractIn this paper, we revisit security notions for dedicated-key hash functions, considering two essential theoretical aspects; namely, formal definitions for security notions, and the relationships among them. Our contribution is twofold. First, we provide a new set of enhanced security notions for dedicated-key hash functions. The provision of this set of enhanced properties has been motivated by the introduction of the enhanced target collision resistance (eTCR) property by Halevi and Krawczyk at Crypto 2006. We notice that the eTCR property does not belong to the set of the seven security notions previously investigated by Rogaway and Shrimpton at FSE 2004; namely: Coll, Sec, aSec, eSec, Pre, aPre and ePre. The fact that eTCR, as a new useful property, is the enhanced variant of the well-known TCR (a.k.a. eSec or UOWHF) property motivates one to investigate the possibility of providing enhanced variants for the other properties. We provide such an enhanced set of properties. Interestingly, there are six enhanced variants of security notions available, excluding “ePre” which can be demonstrated to be non-enhanceable. As the second and main part of our contribution, we provide a full picture of the relationships (i.e. implications and separations) among the (thirteen) security properties including the (six) enhanced properties and the previously considered seven properties. The implications and separations are supported by formal proofs (reductions) and/or counterexamples in the concrete-security framework.
Citation InformationMohammad R Reyhanitabar, Willy Susilo and Yi Mu. "Enhanced security notions for dedicated-key hash functions: Definitions and relationships" 17th International Workshop, FSE 2010 Fast Software Entryption, 7-10 February 2, Korea. Lecture Notes in Computer Science Vol. 6147 (2010) p. 192 - 211
Available at: http://works.bepress.com/ymu/22/