Struck, Patrick (2022)
Security of Cryptographic Primitives in Advanced Security Notions.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021132
Ph.D. Thesis, Primary publication, Publisher's Version
Text
Thesis_Struck.pdf Copyright Information: CC BY-NC-ND 4.0 International - Creative Commons, Attribution NonCommercial, NoDerivs. Download (2MB) |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Security of Cryptographic Primitives in Advanced Security Notions | ||||
Language: | English | ||||
Referees: | Schneider, Prof. Dr. Thomas ; Krämer, Prof. Dr. Juliane ; Alagic, Prof. Dr. Gorjan | ||||
Date: | 2022 | ||||
Place of Publication: | Darmstadt | ||||
Collation: | xvi, 269 Seiten | ||||
Date of oral examination: | 30 March 2022 | ||||
DOI: | 10.26083/tuprints-00021132 | ||||
Abstract: | The provable security paradigm is an important tool to show security of cryptographic primitives. Here, security follows from showing that an adversary cannot break a scheme with respect to some security notion. Standard security notions, however, often do not cover scenarios that might happen in practice. Examples are side-channel leakage as well as usage of keys and random coins that are somehow related. Another setting that often is not considered is security with respect to adversaries that have quantum computing power. In this thesis we study security of schemes in advanced security notions; these notions model more sophisticated attacks which can happen when using such schemes. We develop new advanced security notions, analyse existing primitives with respect to these, and construct primitives that achieve such advanced security notions. The first part of this thesis focuses on security outside the black-box model. Here, we develop a generic blueprint for a leakage-resilient authenticated encryption scheme from leakage-resilient functions. We then provide an instantiation entirely built from sponges. Furthermore, we provide security notions for related-key attacks against authenticated encryption schemes and analyse generic constructions with respect to these. Finally, we study the security of public key encryption schemes in case of reused random coins; we prove a simplification of the security notion which was already claimed yet backed up by a proof which was later identified as flawed. The second part focuses on security against the glooming threat of quantum computers. First, we provide positive results for the post-quantum security of several primitives. We develop a lifting theorem for public key encryption schemes from classical proofs in the random oracle model to post-quantum proofs in the quantum random oracle model. We further show post-quantum security of the sponge-based authenticated encryption scheme developed in the first part, a generic construction for deterministic wallets, and Yao's garbled circuits. Second, we develop a quantum security notion for public key encryption schemes which allows for a quantum challenge phase; we provide both positive and negative results with respect to this security notion. |
||||
Alternative Abstract: |
|
||||
Status: | Publisher's Version | ||||
URN: | urn:nbn:de:tuda-tuprints-211321 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > QPC - Quantum and Physical attack resistant Cryptography | ||||
TU-Projects: | DFG|SFB1119|P1_Krämer_SFB_1119_S | ||||
Date Deposited: | 17 May 2022 12:34 | ||||
Last Modified: | 17 Aug 2022 07:18 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/21132 | ||||
PPN: | 495522120 | ||||
Export: |
View Item |