{"id":"https://openalex.org/W4406309602","doi":"https://doi.org/10.62056/ayfhp2fgx","title":"On the Key-Commitment Properties of Forkcipher-based AEADs","display_name":"On the Key-Commitment Properties of Forkcipher-based AEADs","publication_year":2025,"publication_date":"2025-01-13","ids":{"openalex":"https://openalex.org/W4406309602","doi":"https://doi.org/10.62056/ayfhp2fgx"},"language":"en","primary_location":{"id":"doi:10.62056/ayfhp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ayfhp2fgx","pdf_url":"https://cic.iacr.org/p/1/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/4/32/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054077729","display_name":"Mostafizar Rahman","orcid":"https://orcid.org/0000-0003-0934-4769"},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["University of Hyogo"],"affiliations":[{"raw_affiliation_string":"University of Hyogo","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079147419","display_name":"Samir Kundu","orcid":"https://orcid.org/0000-0001-5828-573X"},"institutions":[{"id":"https://openalex.org/I193073490","display_name":"Siksha O Anusandhan University","ror":"https://ror.org/056ep7w45","country_code":"IN","type":"education","lineage":["https://openalex.org/I193073490"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Samir Kundu","raw_affiliation_strings":["Siksha 'O' Anusandhan (Deemed to be) University"],"affiliations":[{"raw_affiliation_string":"Siksha 'O' Anusandhan (Deemed to be) University","institution_ids":["https://openalex.org/I193073490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056480052","display_name":"Takanori Isobe","orcid":"https://orcid.org/0000-0003-4253-5567"},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takanori Isobe","raw_affiliation_strings":["University of Hyogo"],"affiliations":[{"raw_affiliation_string":"University of Hyogo","institution_ids":["https://openalex.org/I180941496"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054077729"],"corresponding_institution_ids":["https://openalex.org/I180941496"],"apc_list":null,"apc_paid":null,"fwci":2.3431,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87520206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"1","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7681670784950256},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40240979194641113},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.32792383432388306},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3207072615623474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21555128693580627}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7681670784950256},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40240979194641113},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.32792383432388306},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3207072615623474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21555128693580627}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/ayfhp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ayfhp2fgx","pdf_url":"https://cic.iacr.org/p/1/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/ayfhp2fgx","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ayfhp2fgx","pdf_url":"https://cic.iacr.org/p/1/4/32/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2744560816","display_name":null,"funder_award_id":"05801","funder_id":"https://openalex.org/F4320335839","funder_display_name":"National Institute of Information and Communications Technology"},{"id":"https://openalex.org/G3068938799","display_name":null,"funder_award_id":"JPJ012368C","funder_id":"https://openalex.org/F4320335839","funder_display_name":"National Institute of Information and Communications Technology"}],"funders":[{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320335839","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406309602.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2504919933","https://openalex.org/W2740612841","https://openalex.org/W2795336163","https://openalex.org/W2883822506","https://openalex.org/W2899469819","https://openalex.org/W2990961241","https://openalex.org/W3108438139","https://openalex.org/W3111936816","https://openalex.org/W3152615333","https://openalex.org/W3201306356","https://openalex.org/W4285152302","https://openalex.org/W4296960192","https://openalex.org/W4365807719","https://openalex.org/W4378530766","https://openalex.org/W4388858959","https://openalex.org/W4389619883","https://openalex.org/W4389648876","https://openalex.org/W4392358714","https://openalex.org/W4399597749","https://openalex.org/W4400413602","https://openalex.org/W4401647394","https://openalex.org/W4403175056"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Forkcipher-based":[0],"AEADs":[1],"have":[2],"emerged":[3],"as":[4,17,64,68,176],"lightweight":[5,199],"and":[6,20,34,38,118,124,134,166,168,178,201],"efficient":[7],"cryptographic":[8],"modes,":[9],"making":[10],"them":[11],"suitable":[12],"for":[13,60,197],"resource-constrained":[14],"environments":[15],"such":[16,63,175],"IoT":[18],"devices":[19],"distributed":[21],"decryption":[22],"through":[23],"MPC.":[24],"These":[25,180],"schemes,":[26],"including":[27,163],"prominent":[28],"examples":[29],"like":[30],"Eevee":[31],"(Jolteon,":[32],"Espeon,":[33],"Umbreon),":[35],"PAEF,":[36,165],"RPAEF,":[37],"SAEF,":[39,167],"leverage":[40],"the":[41,88,99,109,125,187],"properties":[42,90],"of":[43,54,91,98,144,189],"forkciphers":[44],"to":[45,108,159,171],"achieve":[46],"enhanced":[47],"performance.":[48],"However,":[49],"their":[50,198,203],"security":[51,215],"in":[52,112,186,208],"terms":[53],"key":[55],"commitment,":[56],"a":[57,142,183],"critical":[58],"property":[59],"certain":[61],"applications":[62],"secure":[65],"cloud":[66],"services,":[67],"highlighted":[69],"by":[70],"Albertini":[71],"et":[72],"al.":[73],"(USENIX":[74],"2022),":[75],"has":[76],"not":[77],"been":[78],"comprehensively":[79],"analyzed":[80],"until":[81],"now.":[82],"In":[83],"this":[84],"work,":[85],"we":[86],"analyze":[87],"key-commitment":[89,104,214],"forkcipher-based":[92,100,161,190],"AEADs.":[93,191],"We":[94],"found":[95],"that":[96,137],"some":[97],"AEAD":[101],"schemes":[102],"lack":[103],"properties,":[105],"primarily":[106],"due":[107],"distinctive":[110],"manner":[111],"which":[113],"they":[114],"process":[115],"associated":[116,132],"data":[117,133],"plaintext.":[119],"For":[120],"two":[121],"different":[122],"keys":[123],"same":[126],"nonce,":[127],"an":[128],"adversary":[129],"can":[130],"identify":[131],"plaintext":[135],"blocks":[136],"produce":[138],"identical":[139],"ciphertext-tags":[140],"with":[141],"complexity":[143],"<mml:math":[145],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[146],"<mml:mrow>":[147],"<mml:mi>O</mml:mi>":[148],"<mml:mo":[149,152],"stretchy=\"false\">(</mml:mo>":[150],"<mml:mn>1</mml:mn>":[151],"stretchy=\"false\">)</mml:mo>":[153],"</mml:mrow>":[154],"</mml:math>.":[155],"Our":[156],"findings":[157,181],"apply":[158],"various":[160],"AEADs,":[162],"Eevee,":[164],"naturally":[169],"extend":[170],"less":[172],"strict":[173],"frameworks,":[174],"CMT-1":[177],"CMT-4.":[179],"highlight":[182],"significant":[184],"limitation":[185],"robustness":[188,212],"While":[192],"these":[193],"modes":[194],"are":[195],"attractive":[196],"design":[200],"efficiency,":[202],"deployment":[204],"should":[205],"be":[206],"restricted":[207],"scenarios":[209],"where":[210],"explicit":[211],"or":[213],"is":[216],"required.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
