Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes

被引:0
|
作者
Seito, Takenobu [1 ]
Aikawa, Tadashi [1 ]
Shikata, Junji [1 ]
Matsumoto, Tsutomu [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
关键词
information-theoretic security; key-insulated security; multireceiver authentication-code; unconditional security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Exposing a secret-key is one of the most disastrous threats in cryptographic protocols. The key-insulated security is proposed with the aim of realizing the protection against such key-exposure problems. In this paper, we study key-insulated authentication schemes with information-theoretic security. More specifically, we focus on one of information-theoretically secure authentication, called rnultireceiver authentication codes, and we newly define a model and security notions of information-theoretically secure key-insulated rnultireceiver authentication codes (KI-MRA for short) based on the ideas of both computationally secure key-insulated signature schemes and multi-receiver authentication-codes with information-theoretic setting. In addition, we show lower bounds of sizes of entities' secret-keys. We also provide two kinds of constructions of KI-MRA: direct and generic constructions which are provably secure in our security definitions. It is shown that the direct construction meets the lower bounds of key-sizes with equality. Therefore, it turns out that our lower bounds are tight, and that the direct construction is optimal.
引用
收藏
页码:148 / 165
页数:18
相关论文
共 50 条
  • [21] Information-Theoretically Secure MPC Against Mixed Dynamic Adversaries
    Damgard, Ivan
    Escudero, Daniel
    Ravi, Divya
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 591 - 622
  • [22] Information-Theoretically Secure Neural Network Training with Flexible Deployment
    Zhou, Hengcheng
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT V, 2023, 14258 : 324 - 336
  • [23] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 165 - 167
  • [24] An information-theoretically secure quantum multiparty private set intersection
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [25] PERCOLATION ON THE INFORMATION-THEORETICALLY SECURE SIGNAL TO INTERFERENCE RATIO GRAPH
    Vaze, Rahul
    Iyer, Srikanth
    JOURNAL OF APPLIED PROBABILITY, 2014, 51 (04) : 910 - 920
  • [26] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [27] Strongly secure certificateless key-insulated signature secure in the standard model
    Yanan Chen
    Weixiang Xu
    Hu Xiong
    annals of telecommunications - annales des télécommunications, 2015, 70 : 395 - 405
  • [28] Strongly secure certificateless key-insulated signature secure in the standard model
    Chen, Yanan
    Xu, Weixiang
    Xiong, Hu
    ANNALS OF TELECOMMUNICATIONS, 2015, 70 (9-10) : 395 - 405
  • [29] Information-Theoretically Secure and Highly Efficient Search and Row Retrieval
    Sharma, Shantanu
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Kumari, Komal
    Roychoudhury, Swagnik
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (10): : 2391 - 2403
  • [30] ITSEC: An Information-theoretically Secure Framework for Truthful Spectrum Auctions
    Chen, Zhili
    Huang, Liusheng
    Chen, Lin
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,