Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions - Security Engineering and Intelligence Informatics
Conference Papers Year : 2013

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions

Abstract

In authentication schemes where many users send authenticated messages to a receiver, it is desirable to aggregate them into a single short authenticated message in order to reduce communication complexity. In this paper, in order to realize such a mechanism in information-theoretic security setting, we first propose aggregate authentication codes. Specifically, we newly propose a model and a security definition for aggregate authentication codes. We also show tight lower bounds on sizes of entities’ secret-keys and (aggregated) tags. Furthermore, we present optimal (i.e., most efficient) constructions for aggregate authentication codes.
Fichier principal
Vignette du fichier
978-3-642-40588-4_2_Chapter.pdf (296.22 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01506569 , version 1 (12-04-2017)

Licence

Identifiers

  • HAL Id : hal-01506569 , version 1

Cite

Asato Kubai, Junji Shikata, Yohei Watanabe. Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions. 1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.16-28. ⟨hal-01506569⟩
166 View
116 Download

Share

More