[Resource Topic] 2024/727: Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise

Welcome to the resource topic for 2024/727

Title:
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise

Authors: Joseph Jaeger

Abstract:

We show that the adaptive compromise security definitions of Jaeger and Tyagi (Crypto '20) cannot be applied in several natural use-cases. These include proving multi-user security from single-user security, the security of the cascade PRF, and the security of schemes sharing the same ideal primitive. We provide new variants of the definitions and show that they resolve these issues with composition. Extending these definitions to the asymmetric settings, we establish the security of the modular KEM/DEM and Fujisaki-Okamoto approaches to public key encryption in the full adaptive compromise setting. This allows instantiations which are more efficient and standard than prior constructions.

ePrint: https://eprint.iacr.org/2024/727

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .