Offline-Online Indifferentiability of Cryptographic Systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The indifferentiability framework has become a standard methodology that enables us to study the security of cryptographic constructions in idealized models of computation. Unfortunately, while indifferentiability provides strong guarantees whenever the security of a construction is captured by a “single-stage” security game, it may generally provide no meaningful guarantees when the security is captured by a “multi-stage” one. In particular, the indifferentiability framework does not capture offline-online games, where the adversary can perform an extensive offline computation to later speed up the online phase. Such security games are extremely common, both in practice and in theory. Over the past decade, there has been numerous attempts to meaningfully extend the indifferentiability framework to offline-online games, however, they all ultimately met with little success. In this work, our contribution is threefold. First, we propose an extension of the classical indifferentiability framework, we refer to as offline-online-indifferentiability, that applies in the context of attackers with an expensive offline phase (à la Ghoshal and Tessaro, CRYPTO ’23). Second, we show that our notion lends itself to a natural and meaningful composition theorem for offline-online security games. Lastly, as our main technical contribution, we analyze the offline-online-indifferentiability of two classical variants of the Merkle-Damgård hashing mechanism, one where the key is fed only to the first block in the chain and the other where the key is fed to each block in the chain. For both constructions, we prove a tight bound on their offline-online-indifferentiability (i.e., an upper bound and an attack that matches it). Notably, our bound for the second variant shows that the construction satisfies optimal offline-online-indifferentiability.

Original languageEnglish
Title of host publicationTheory of Cryptography - 23rd International Conference, TCC 2025, Proceedings
EditorsBenny Applebaum, Huijia (Rachel) Lin
PublisherSpringer Science and Business Media Deutschland GmbH
Pages3-33
Number of pages31
ISBN (Print)9783032122926
DOIs
StatePublished - 2026
Event23rd International Conference on Theory of Cryptography, TCC 2025 - Aarhus, Denmark
Duration: 1 Dec 20255 Dec 2025

Publication series

NameLecture Notes in Computer Science
Volume16269 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Conference on Theory of Cryptography, TCC 2025
Country/TerritoryDenmark
CityAarhus
Period1/12/255/12/25

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2026.

Fingerprint

Dive into the research topics of 'Offline-Online Indifferentiability of Cryptographic Systems'. Together they form a unique fingerprint.

Cite this