Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size

被引:5
|
作者
Wu, Ying [1 ,2 ]
Chang, Jinyong [3 ]
Xue, Rui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Changzhi Univ, Dept Math, Changzhi 046011, Peoples R China
来源
COMPUTER JOURNAL | 2017年 / 60卷 / 12期
基金
中国国家自然科学基金;
关键词
homomorphic MAC; network coding; pollution attack; algebraic one way functions; POLLUTION ATTACKS; AUTHENTICATION; SCHEME; MULTICAST;
D O I
10.1093/comjnl/bxx055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding is a routing technique that differs from traditional 'store-and-forward' mechanisms. It allows intermediate nodes to modify packets in transit. It is well known that network coding can increase throughput and improve robustness in network. However, it is the messages mixing feature that makes network coding susceptive to pollution attacks. To address this problem, homomorphic message authentication codes (MACs) have been proposed. The existing homomorphic MAC schemes adopt inner product to authenticate a message with a tag over a field F-q. In practical instantiations, the size of the field F-q is normally chosen (or desired) to be small (typically set as 2(8)) to limit computational and communication overheads. In these settings, an adversary will break the schemes with probability at least 1/q (typically 1/2(8)). The security is not guaranteed in this case. To waver the limitations and enhance the security, multiple tags are adopted for each message, that certainly incurs large key size overhead and is not preferred in applications. A scheme of homomorphic MAC with preferring security and shorter keys is much expected, and till now, to our knowledge, is not successfully constructed. This work solves this problem by presenting a new homomorphic MAC scheme for authentication in network coding. The proposed scheme allows us to authenticate a message in a linear space over a field of moderate size and at the same time, achieves a reliable security with a short key. The construction is based on a recently invented somewhat public-key notion: algebraic one-way function, by Catalano et al. (TCC 2013). Compared to the existing schemes, our scheme possesses the advantages that it achieves stronger security with much shorter keys, and is practical in applications. Hence resolve the longstanding problem.
引用
收藏
页码:1785 / 1800
页数:16
相关论文
共 50 条
  • [1] An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding
    Cheng, Chi
    Jiang, Tao
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (10) : 2096 - 2100
  • [2] Comments on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"
    Kim, Young-Sik
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3619 - 3620
  • [3] Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"
    Li, Chen
    Chen, Le
    Lu, Rongxing
    Li, Hui
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (03) : 882 - 883
  • [4] Algebraic (Trapdoor) One-Way Functions and Their Applications
    Catalano, Dario
    Fiore, Dario
    Gennaro, Rosario
    Vamvourellis, Konstantinos
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 680 - 699
  • [5] Algebraic (trapdoor) one-way functions: Constructions and applications
    Catalano, Dario
    Fiore, Dario
    Gennaro, Rosario
    Vamvourellis, Konstantinos
    Theoretical Computer Science, 2015, 592 : 143 - 165
  • [6] Algebraic (trapdoor) one-way functions: Constructions and applications
    Catalano, Dario
    Fiore, Dario
    Gennaro, Rosario
    Vamvourellis, Konstantinos
    THEORETICAL COMPUTER SCIENCE, 2015, 592 : 143 - 165
  • [7] Algebraic (trapdoor) one-way functions: Constructions and applications
    Catalano, Dario
    Fiore, Dario
    Gennaro, Rosario
    Vamvourellis, Konstantinos
    Theoretical Computer Science, 2015, 592 : 143 - 165
  • [8] Biological One-Way Functions for Secure Key Generation
    Dodda, Akhil
    Wali, Akshay
    Wu, Yang
    Pannone, Andrew
    Reddy, Likhith Kumar
    Raha, Arnab
    Ozdemir, Sahin Kaya
    Ozbolat, Ibrahim Tarik
    Das, Saptarshi
    ADVANCED THEORY AND SIMULATIONS, 2019, 2 (02)
  • [9] Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions
    Mao, Xinyu
    Mazor, Noam
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 502 - 531
  • [10] KEY MANAGEMENT WITH THE AID OF ONE-WAY FUNCTIONS IN GALOIS FIELDS
    KOLLER, A
    LAGGER, H
    SIEMENS FORSCHUNGS-UND ENTWICKLUNGSBERICHTE-SIEMENS RESEARCH AND DEVELOPMENT REPORTS, 1983, 12 (04): : 261 - 266