TY - GEN
T1 - Quantum-secure message authentication codes
AU - Boneh, Dan
AU - Zhandry, Mark
PY - 2013
Y1 - 2013
N2 - We construct the first Message Authentication Codes (MACs) that are existentially unforgeable against a quantum chosen message attack. These chosen message attacks model a quantum adversary's ability to obtain the MAC on a superposition of messages of its choice. We begin by showing that a quantum secure PRF is sufficient for constructing a quantum secure MAC, a fact that is considerably harder to prove than its classical analogue. Next, we show that a variant of Carter-Wegman MACs can be proven to be quantum secure. Unlike the classical settings, we present an attack showing that a pair-wise independent hash family is insufficient to construct a quantum secure one-time MAC, but we prove that a four-wise independent family is sufficient for one-time security.
AB - We construct the first Message Authentication Codes (MACs) that are existentially unforgeable against a quantum chosen message attack. These chosen message attacks model a quantum adversary's ability to obtain the MAC on a superposition of messages of its choice. We begin by showing that a quantum secure PRF is sufficient for constructing a quantum secure MAC, a fact that is considerably harder to prove than its classical analogue. Next, we show that a variant of Carter-Wegman MACs can be proven to be quantum secure. Unlike the classical settings, we present an attack showing that a pair-wise independent hash family is insufficient to construct a quantum secure one-time MAC, but we prove that a four-wise independent family is sufficient for one-time security.
KW - MAC
KW - Quantum computing
KW - chosen message attacks
KW - post-quantum security
UR - http://www.scopus.com/inward/record.url?scp=84883393845&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883393845&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-38348-9_35
DO - 10.1007/978-3-642-38348-9_35
M3 - Conference contribution
AN - SCOPUS:84883393845
SN - 9783642383472
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 592
EP - 608
BT - Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
T2 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013
Y2 - 26 May 2013 through 30 May 2013
ER -