Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size

被引:5
|
作者
Wu, Ying [1 ,2 ]
Chang, Jinyong [3 ]
Xue, Rui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Changzhi Univ, Dept Math, Changzhi 046011, Peoples R China
来源
COMPUTER JOURNAL | 2017年 / 60卷 / 12期
基金
中国国家自然科学基金;
关键词
homomorphic MAC; network coding; pollution attack; algebraic one way functions; POLLUTION ATTACKS; AUTHENTICATION; SCHEME; MULTICAST;
D O I
10.1093/comjnl/bxx055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding is a routing technique that differs from traditional 'store-and-forward' mechanisms. It allows intermediate nodes to modify packets in transit. It is well known that network coding can increase throughput and improve robustness in network. However, it is the messages mixing feature that makes network coding susceptive to pollution attacks. To address this problem, homomorphic message authentication codes (MACs) have been proposed. The existing homomorphic MAC schemes adopt inner product to authenticate a message with a tag over a field F-q. In practical instantiations, the size of the field F-q is normally chosen (or desired) to be small (typically set as 2(8)) to limit computational and communication overheads. In these settings, an adversary will break the schemes with probability at least 1/q (typically 1/2(8)). The security is not guaranteed in this case. To waver the limitations and enhance the security, multiple tags are adopted for each message, that certainly incurs large key size overhead and is not preferred in applications. A scheme of homomorphic MAC with preferring security and shorter keys is much expected, and till now, to our knowledge, is not successfully constructed. This work solves this problem by presenting a new homomorphic MAC scheme for authentication in network coding. The proposed scheme allows us to authenticate a message in a linear space over a field of moderate size and at the same time, achieves a reliable security with a short key. The construction is based on a recently invented somewhat public-key notion: algebraic one-way function, by Catalano et al. (TCC 2013). Compared to the existing schemes, our scheme possesses the advantages that it achieves stronger security with much shorter keys, and is practical in applications. Hence resolve the longstanding problem.
引用
收藏
页码:1785 / 1800
页数:16
相关论文
共 50 条
  • [31] Efficient authentication scheme based on one-way key chain for sensor network
    Lang, Wei-Min
    Cheng, Wen-Qing
    Yang, Zong-Kai
    Journal of Harbin Institute of Technology (New Series), 2007, 14 (06) : 756 - 760
  • [32] Adaptively Secure Garbled Circuits from One-Way Functions
    Hemenway, Brett
    Jafargholi, Zahra
    Ostrovsky, Rafail
    Scafuro, Alessandra
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 149 - 178
  • [33] An efficient authentication scheme based on one-way key chain for sensor network
    郎为民
    程文青
    杨宗凯
    Journal of Harbin Institute of Technology, 2007, (06) : 756 - 760
  • [34] Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus
    Kim, Sam
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 576 - 607
  • [35] Hierarchical key establishment protocols based on secure keyed one-way hash functions
    Ku, WC
    Wang, SD
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 162 - 167
  • [36] Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization
    Renes, Joseph M.
    Renner, Renato
    Sutter, David
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 194 - 213
  • [37] Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions
    Kitagawa, Fuyuki
    Morimae, Tomoyuki
    Nishimaki, Ryo
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VII, 2024, 14926 : 93 - 125
  • [38] Counting Unpredictable Bits: A Simple PRG from One-Way Functions
    Mazor, Noam
    Pass, Rafael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT I, 2023, 14369 : 191 - 218
  • [39] On Average-Case Hardness in TFNP from One-Way Functions
    Hubacek, Pavel
    Kamath, Chethan
    Kral, Karel
    Slivova, Veronika
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 614 - 638
  • [40] Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions
    Haitner, Iftach
    Reingold, Omer
    Vadhan, Salil
    STOC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2010, : 437 - 446