- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Automatic Translation feature is available on CiNii Labs
- Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code
Description
In this paper we consider the simplest possible construction of PMAC from a permutation. PMAC-type schemes have been usually constructed from a tweakable blockcipher (TBC). Regarding TBCs, there have been research directions from (1) to (2) and from (1) to (3) described as follows. Here, \(E_{K'}:\{0,1\}^n\rightarrow \{0,1\}^n\) is a blockcipher with a key \(K'\), \(P:\{0,1\}^n\rightarrow \{0,1\}^n\) is a permutation, \(h_K\) is a hash function of a uniform and almost XOR universal family from some tweak space \(\mathcal {TW}\) to \(\{0,1\}^n\), \(tw \in \mathcal {TW}\) is a tweak, and \(x \in \{0,1\}^n\) is an input to a TBC.