Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes

被引:0
|
作者
Seito, Takenobu [1 ]
Aikawa, Tadashi [1 ]
Shikata, Junji [1 ]
Matsumoto, Tsutomu [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
关键词
information-theoretic security; key-insulated security; multireceiver authentication-code; unconditional security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Exposing a secret-key is one of the most disastrous threats in cryptographic protocols. The key-insulated security is proposed with the aim of realizing the protection against such key-exposure problems. In this paper, we study key-insulated authentication schemes with information-theoretic security. More specifically, we focus on one of information-theoretically secure authentication, called rnultireceiver authentication codes, and we newly define a model and security notions of information-theoretically secure key-insulated rnultireceiver authentication codes (KI-MRA for short) based on the ideas of both computationally secure key-insulated signature schemes and multi-receiver authentication-codes with information-theoretic setting. In addition, we show lower bounds of sizes of entities' secret-keys. We also provide two kinds of constructions of KI-MRA: direct and generic constructions which are provably secure in our security definitions. It is shown that the direct construction meets the lower bounds of key-sizes with equality. Therefore, it turns out that our lower bounds are tight, and that the direct construction is optimal.
引用
收藏
页码:148 / 165
页数:18
相关论文
共 50 条
  • [31] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606
  • [32] Information-Theoretically Secret Key Generation for Fading Wireless Channels
    Ye, Chunxuan
    Mathur, Suhas
    Reznik, Alex
    Shah, Yogendra
    Trappe, Wade
    Mandayam, Narayan B.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 240 - 254
  • [33] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [34] Information-Theoretically Secure String Commitments Based on Packet Reordering Channels
    de Morais Alves, Vinicius
    Dowsley, Rafael
    de Sousa, Rafael Timoteo, Jr.
    Nascimento, Anderson C. A.
    IEEE ACCESS, 2021, 9 : 139928 - 139945
  • [35] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +
  • [36] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
  • [37] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Tonicelli, Rafael
    Nascimento, Anderson C. A.
    Dowsley, Rafael
    Mueller-Quade, Joern
    Imai, Hideki
    Hanaoka, Goichiro
    Otsuka, Akira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 73 - 84
  • [38] Security analysis on "Strongly secure certificateless key-insulated signature secure in the standard model"
    Wang, Feng
    Xu, Li
    Pan, Jeng-Shyang
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 195 - 198
  • [39] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (02) : 1401 - 1416
  • [40] Information-Theoretically Secure Multi-Party Linear Regression and Logistic Regression
    Zhou, Hengcheng
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 192 - 199