Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes

被引:0
|
作者
Seito, Takenobu [1 ]
Aikawa, Tadashi [1 ]
Shikata, Junji [1 ]
Matsumoto, Tsutomu [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
关键词
information-theoretic security; key-insulated security; multireceiver authentication-code; unconditional security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Exposing a secret-key is one of the most disastrous threats in cryptographic protocols. The key-insulated security is proposed with the aim of realizing the protection against such key-exposure problems. In this paper, we study key-insulated authentication schemes with information-theoretic security. More specifically, we focus on one of information-theoretically secure authentication, called rnultireceiver authentication codes, and we newly define a model and security notions of information-theoretically secure key-insulated rnultireceiver authentication codes (KI-MRA for short) based on the ideas of both computationally secure key-insulated signature schemes and multi-receiver authentication-codes with information-theoretic setting. In addition, we show lower bounds of sizes of entities' secret-keys. We also provide two kinds of constructions of KI-MRA: direct and generic constructions which are provably secure in our security definitions. It is shown that the direct construction meets the lower bounds of key-sizes with equality. Therefore, it turns out that our lower bounds are tight, and that the direct construction is optimal.
引用
收藏
页码:148 / 165
页数:18
相关论文
共 50 条
  • [1] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [2] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [3] Information-theoretically secure key insulated encryption: Models, bounds and constructions
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (10) : 2521 - 2532
  • [4] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [5] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [6] Information-Theoretically Secure Erasure Codes for Distributed Storage
    Rashmi, K. V.
    Shah, Nihar B.
    Ramchandran, Kannan
    Kumar, P. Vijay
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1621 - 1646
  • [7] Information-theoretically Secure Regenerating Codes for Distributed Storage
    Shah, Nihar B.
    Rashmi, K. V.
    Kumar, P. Vijay
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [8] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
  • [9] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10
  • [10] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 635 - 652