Composable, Unconditionally Secure Message Authentication without any Secret Key

被引:0
|
作者
Ostrev, Dimiter [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust, 6 Ave Fonte, L-4364 Esch Sur Alzette, Luxembourg
关键词
UNAUTHENTICATED PUBLIC CHANNELS; AGREEMENT; CRYPTOGRAPHY; DEFINITIONS; PRIVACY;
D O I
10.1109/isit.2019.8849510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key shared between Alice and Bob, provides information theoretic security, and can safely be composed with other protocols in an arbitrary context.
引用
收藏
页码:622 / 626
页数:5
相关论文
共 50 条
  • [1] Unconditionally Secure Approximate Message Authentication
    Tonien, Dongvu
    Safavi-Naini, Reihaneh
    Nickolas, Peter
    Desmedt, Yvo
    [J]. CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 233 - +
  • [2] ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION
    Tonien, Dongvu
    Safavi-Naini, Reihaneh
    Wild, Peter
    [J]. DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2011, 3 (03) : 287 - 303
  • [3] Practical unconditionally secure two-channel message authentication
    Atefeh Mashatan
    Douglas R. Stinson
    [J]. Designs, Codes and Cryptography, 2010, 55 : 169 - 188
  • [4] Practical unconditionally secure two-channel message authentication
    Mashatan, Atefeh
    Stinson, Douglas R.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2010, 55 (2-3) : 169 - 188
  • [5] A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
    Koichi Koizumi
    Takaaki Mizuki
    Takao Nishizeki
    [J]. Theory of Computing Systems, 2008, 42 : 187 - 221
  • [6] A revised transformation protocol for unconditionally secure secret key exchange
    Koizumi, Koichi
    Mizuki, Takaaki
    Nishizeki, Takao
    [J]. THEORY OF COMPUTING SYSTEMS, 2008, 42 (02) : 187 - 221
  • [7] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    [J]. Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296
  • [8] Unconditionally secure entity authentication
    Kurosawa, K
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 298 - 298
  • [9] Multiround Unconditionally Secure Authentication
    Gehrmann C.
    [J]. Designs, Codes and Cryptography, 1998, 15 (1) : 67 - 86
  • [10] A secure dynamic remote user authentication without any secure channel
    Saxena, Ashutosh
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 617 - 617