Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size

被引:5
|
作者
Wu, Ying [1 ,2 ]
Chang, Jinyong [3 ]
Xue, Rui [1 ,2 ]
Zhang, Rui [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Changzhi Univ, Dept Math, Changzhi 046011, Peoples R China
来源
COMPUTER JOURNAL | 2017年 / 60卷 / 12期
基金
中国国家自然科学基金;
关键词
homomorphic MAC; network coding; pollution attack; algebraic one way functions; POLLUTION ATTACKS; AUTHENTICATION; SCHEME; MULTICAST;
D O I
10.1093/comjnl/bxx055
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding is a routing technique that differs from traditional 'store-and-forward' mechanisms. It allows intermediate nodes to modify packets in transit. It is well known that network coding can increase throughput and improve robustness in network. However, it is the messages mixing feature that makes network coding susceptive to pollution attacks. To address this problem, homomorphic message authentication codes (MACs) have been proposed. The existing homomorphic MAC schemes adopt inner product to authenticate a message with a tag over a field F-q. In practical instantiations, the size of the field F-q is normally chosen (or desired) to be small (typically set as 2(8)) to limit computational and communication overheads. In these settings, an adversary will break the schemes with probability at least 1/q (typically 1/2(8)). The security is not guaranteed in this case. To waver the limitations and enhance the security, multiple tags are adopted for each message, that certainly incurs large key size overhead and is not preferred in applications. A scheme of homomorphic MAC with preferring security and shorter keys is much expected, and till now, to our knowledge, is not successfully constructed. This work solves this problem by presenting a new homomorphic MAC scheme for authentication in network coding. The proposed scheme allows us to authenticate a message in a linear space over a field of moderate size and at the same time, achieves a reliable security with a short key. The construction is based on a recently invented somewhat public-key notion: algebraic one-way function, by Catalano et al. (TCC 2013). Compared to the existing schemes, our scheme possesses the advantages that it achieves stronger security with much shorter keys, and is practical in applications. Hence resolve the longstanding problem.
引用
收藏
页码:1785 / 1800
页数:16
相关论文
共 50 条
  • [41] Efficient pseudorandom generators from exponentially hard one-way functions
    Haitner, Iftach
    Harnik, Danny
    Reingold, Omer
    AUTOMATA, LANGAGES AND PROGRAMMING, PT 2, 2006, 4052 : 228 - 239
  • [42] Secure Multi-hop Network Programming With Multiple One-way Key Chains
    Tan, Hailun
    Jha, Sanjay
    Ostry, Diet
    Zic, John
    Sivaraman, Vijay
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 183 - 193
  • [43] EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS
    Haitner, Iftach
    Reingold, Omer
    Vadhan, Salil
    SIAM JOURNAL ON COMPUTING, 2013, 42 (03) : 1405 - 1430
  • [44] Construction of one-way hash functions with increased key space using adaptive chaotic maps
    Tutueva, Aleksandra, V
    Karimov, Artur, I
    Moysis, Lazaros
    Volos, Christos
    Butusov, Denis N.
    CHAOS SOLITONS & FRACTALS, 2020, 141
  • [45] Robust generalized MQV key agreement protocol without using one-way hash functions
    Tseng, YM
    COMPUTER STANDARDS & INTERFACES, 2002, 24 (03) : 241 - 246
  • [46] Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
    Shim, Kyung-Ah
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 467 - 470
  • [47] Hardness of Non-interactive Differential Privacy from One-Way Functions
    Kowalczyk, Lucas
    Malkin, Tal
    Ullman, Jonathan
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 437 - 466
  • [48] Pseudorandom generators from one-way functions: A simple construction for any hardness
    Holenstein, Thomas
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 443 - 461
  • [49] New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups
    Magliveras, SS
    Stinson, DR
    van Trung, T
    JOURNAL OF CRYPTOLOGY, 2002, 15 (04) : 285 - 297
  • [50] Security of robust generalized MQV key agreement protocol without using one-way hash functions
    Shao, ZH
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 431 - 436