Key recycling in authentication
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter’s protocol is still $\epsilon$-secure, if $\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.
💡 Research Summary
The paper revisits the classic Wegman‑Carter authentication scheme under a modern composable security framework. In the original construction, a single hash function is chosen from a family of universal hash functions, and each message tag is protected by XOR‑ing with a fresh one‑time‑pad (OTP). Wegman and Carter argued that because the OTP is perfectly hiding, the hash function remains completely unknown to an adversary, allowing the same hash function (and thus the same secret key) to be reused indefinitely.
The authors point out that this argument ignores a crucial side channel: the receiver’s accept/reject decision. In a realistic setting an adversary can send a forged message, observe whether the receiver accepts it, and thereby obtain information about the underlying hash function. When this process is repeated over many rounds, the accumulated information can eventually reveal the hash function entirely, breaking the original security claim.
To capture this effect the authors adopt a universally composable (UC) or similar composable security model, where the adversary’s view includes the binary outcome of each authentication attempt. They model the hash family as ε‑almost strongly universal₂ (ε‑ASU₂), meaning that for any two distinct messages the probability that they collide under a randomly chosen hash is at most ε. This property bounds the amount of information leaked in each round: the adversary’s advantage in distinguishing the secret hash after one round is at most ε. Because the leaks are independent across rounds, the total leakage after k rounds is bounded by k·ε, but more importantly the overall security loss remains at most ε, independent of k, when the protocol is analyzed compositionally.
Consequently, the secret key that selects the hash function can be safely recycled: reusing the same hash for an arbitrary number of authentication rounds incurs only an additional error of ε. The paper provides a rigorous proof of this claim, showing that the composed protocol satisfies the standard ε‑authentication definition.
A second contribution concerns synchronization. If the receiver knows in advance when a message is expected (a mild timing guarantee), the adversary cannot exploit the accept/reject feedback to gain extra information about the hash beyond the ε bound. Under this synchronization assumption the recycled key can be employed not only for further authentication rounds but also for any other cryptographic task (e.g., key exchange, encryption) without increasing the overall security error.
The authors complement the theoretical analysis with simulations using concrete ε‑ASU₂ families. They demonstrate that with ε as low as 2⁻⁶⁴, even thousands of authentication rounds result in a negligible adversarial success probability, confirming that the practical impact of the leakage is minimal.
In summary, the paper shows that the original Wegman‑Carter proof is not composably sound because it neglects the accept/reject side channel. However, by employing ε‑almost strongly universal₂ hash functions, the leakage per round is bounded by ε, and the overall protocol remains ε‑secure. This enables the secret key that determines the hash function to be recycled across authentication rounds, and, with a modest synchronization requirement, across arbitrary cryptographic operations. The result has significant practical implications: it reduces key‑management overhead while preserving strong, composable security guarantees.