ε-MACs: Towards More Secure and More Efficient Constructions of Secure Channels

被引:0
|
作者
Alomair, Basel [1 ]
Poovendran, Radha [1 ]
机构
[1] Univ Washington Seattle, NSL, Seattle, WA USA
关键词
Confidentiality; authenticity; message authentication code (MAC); authenticated encryption; encrypt-and-authenticate; universal hash families; MESSAGE-AUTHENTICATION CODE; HASH FUNCTIONS; ENCRYPTION; MODE; PERFORMANCE; OPERATION; GENERATOR;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cryptography, secure channels enable the confidential and authenticated message exchange between authorized users. A generic approach of constructing such channels is by combining an encryption primitive with an authentication primitive (MAC). In this work, we introduce the design of a new cryptographic primitive to be used in the construction of secure channels. Instead of using general purpose MACs, we propose the employment of special purpose MACs, named "epsilon-MACs". The main motive behind this work is the observation that, since the message must be both encrypted and authenticated, there can be a redundancy in the computations performed by the two primitives. If this turned out to be the case, removing such redundancy will improve the efficiency of the overall construction. In addition, computations performed by the encryption algorithm can be further utilized to improve the security of the authentication algorithm. In this work, we show how epsilon-MACs can be designed to reduce the amount of computations required by standard MACs based on universal hash functions, and show how epsilon-MACs can be secured against key-recovery attacks.
引用
收藏
页码:292 / 310
页数:19
相关论文
共 50 条
  • [31] MAKING DATA MORE SECURE
    MARSH, R
    DATAMATION, 1976, 22 (10): : 67 - 69
  • [32] Smarter, more secure smartcards
    Blythe, I
    BYTE, 1997, 22 (06): : 63 - 64
  • [33] Toward a more secure Internet
    Atkinson, RJ
    COMPUTER, 1997, 30 (01) : 57 - 61
  • [34] Toward a more secure world
    Holton, W. Conard
    LASER FOCUS WORLD, 2013, 49 (11): : 7 - 7
  • [35] A More Secure and Efficient Remote Authentication Scheme with Key Agreement
    Guo, Dianli
    Wen, Fengtong
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ELECTRIC AND ELECTRONICS, 2013, : 119 - 122
  • [36] More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems
    Huang, Zhicong
    Hong, Cheng
    Weng, Chenkai
    Lu, Wen-jie
    Qu, Hunter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 551 - 562
  • [37] Toward more secure constructions of flexible multi-client functional encryption schemes
    Rafiee, Mojtaba
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [38] Towards Efficient and Secure Cloud
    Radwan, Tarek
    Azer, Marianne
    Abdelbaki, Nashwa
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 134 - 140
  • [39] Where Marx was right: towards a more secure foundation for heterodox economics
    Howard, MC
    King, JE
    CAMBRIDGE JOURNAL OF ECONOMICS, 2001, 25 (06) : 785 - 807
  • [40] More Efficient (Almost) Tightly Secure Structure-Preserving Signatures
    Gay, Romain
    Hofheinz, Dennis
    Kohl, Lisa
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 230 - 258