Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes

被引:0
|
作者
Seito, Takenobu [1 ]
Aikawa, Tadashi [1 ]
Shikata, Junji [1 ]
Matsumoto, Tsutomu [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
关键词
information-theoretic security; key-insulated security; multireceiver authentication-code; unconditional security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Exposing a secret-key is one of the most disastrous threats in cryptographic protocols. The key-insulated security is proposed with the aim of realizing the protection against such key-exposure problems. In this paper, we study key-insulated authentication schemes with information-theoretic security. More specifically, we focus on one of information-theoretically secure authentication, called rnultireceiver authentication codes, and we newly define a model and security notions of information-theoretically secure key-insulated rnultireceiver authentication codes (KI-MRA for short) based on the ideas of both computationally secure key-insulated signature schemes and multi-receiver authentication-codes with information-theoretic setting. In addition, we show lower bounds of sizes of entities' secret-keys. We also provide two kinds of constructions of KI-MRA: direct and generic constructions which are provably secure in our security definitions. It is shown that the direct construction meets the lower bounds of key-sizes with equality. Therefore, it turns out that our lower bounds are tight, and that the direct construction is optimal.
引用
收藏
页码:148 / 165
页数:18
相关论文
共 50 条
  • [41] Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 79 : 1401 - 1416
  • [42] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Rafael Tonicelli
    Anderson C. A. Nascimento
    Rafael Dowsley
    Jörn Müller-Quade
    Hideki Imai
    Goichiro Hanaoka
    Akira Otsuka
    International Journal of Information Security, 2015, 14 : 73 - 84
  • [43] Information Theoretically Secure Encryption with Almost Free Authentication
    Alomair, Basel
    Poovendran, Radha
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (15) : 2937 - 2956
  • [44] INFORMATION THEORETICALLY SECURE KEY EXCHANGE ALGORITHM
    Besoul, Khaldoun
    AL Mahmoud, Qassim
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 111 - 125
  • [45] A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud
    Hong, Hanshu
    Sun, Zhixin
    Liu, Ximeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (05): : 2394 - 2406
  • [46] Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption
    Hu, Yanglin
    Ouyang, Yingkai
    Tomamichel, Marco
    QUANTUM, 2023, 7
  • [47] Efficient and secure pairing-free certificateless strong key-insulated signature scheme
    Babu, A. Ramesh
    Gayathri, N. B.
    Reddy, P. Vasudeva
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2019, 23 (03) : 155 - 166
  • [48] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [49] Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce
    Shi, Yang
    Lin, Jie
    Xiong, Guoyue
    Wang, Xiaoping
    Fan, Hongfei
    MOBILE INFORMATION SYSTEMS, 2016, 2016 : 1 - 18
  • [50] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    Almanee, Sumaya
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 843 - 864