{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T15:49:43Z","timestamp":1773676183747,"version":"3.50.1"},"reference-count":0,"publisher":"Universitatsbibliothek der Ruhr-Universitat Bochum","issue":"1","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ToSC"],"abstract":"<jats:p>At Eurocrypt\u201916, M\u00e9aux et al. designed a construction for symmetric ciphers that can be efficiently evaluated with Fully Homomorphic Encryption, dubbed Filter Permutator. They also specify FLIP, a family of Filter Permutators. Creating FiLIP, they improved their first construction using whitening keys and reduction of the initial key register. Later, Cosseron et al. and Hoffmann et al. proposed successive generalisations of their work, creating the new families of Group Filter Permutators and then Mixed Filter Permutators. In this article, we prove the generic security of Mixed Filter Permutators in the Random Oracle Model. Moreover, we study a derived scheme that avoids using whitening keys. We show that the resulting construction is less secure by providing an attack for some parameter choices that would yield a Mixed Filter Permutator that is secure in the Random Oracle Model. Finally, we prove a security bound for this Mixed Filter Permutators construction without the whitening key.<\/jats:p>","DOI":"10.46586\/tosc.v2026.i1.5-30","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:17:50Z","timestamp":1773670670000},"page":"5-30","source":"Crossref","is-referenced-by-count":0,"title":["Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model"],"prefix":"10.46586","volume":"2026","author":[{"given":"Beno\u00eet","family":"Cogliati","sequence":"first","affiliation":[]},{"given":"Simon","family":"Demarty","sequence":"additional","affiliation":[]}],"member":"25480","published-online":{"date-parts":[[2026,3,16]]},"container-title":["IACR Transactions on Symmetric Cryptology"],"original-title":[],"link":[{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/download\/12776\/12465","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/download\/12776\/12465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:17:50Z","timestamp":1773670670000},"score":1,"resource":{"primary":{"URL":"https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/12776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,3,16]]}},"URL":"https:\/\/doi.org\/10.46586\/tosc.v2026.i1.5-30","relation":{},"ISSN":["2519-173X"],"issn-type":[{"value":"2519-173X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]}}}