A function family (where is the key length, taken to be the security parameter) is Target Collision Resistant if any adversary (whose resources are bounded by a polynomial in ) can win in the following game only with negligible probability. First generates a value in the common domain of . Next an -bit key is randomly chosen and given to . Next wins if it generates such that . Note that target collision resistance implies 2nd pre-image collision resistance. See more details in [3, 23].
In our scheme we use a PRF family that also has the following flavor of target collision resistance. First a key is chosen at random, and the adversary is given . Next the adversary is assumed to be unable (except with negligible probability) to find such that .
Since any PRF family is also a secure MAC family, in our schemes we use the same
function family for both purposes. Still, for clarity, in the sequel we
differentiate between the cryptographic functionality of a PRF and a
MAC.
In addition, we use digital signatures (secure against chosen message attacks, see [15]), where the sender holds the signing key and all receivers hold the corresponding public verification key. The way in which the receivers obtain the verification key is left out of scope.