Information-Theoretically Secure Entity Authentication in the Multi-user Setting

被引:0
|
作者
Hajime, Shogo [1 ]
Watanabe, Yohei [1 ]
Shikata, Junji [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 240, Japan
关键词
D O I
10.1007/978-3-319-12160-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study unilateral entity authentication protocols and mutual entity authentication protocols with information-theoretic security in the multi-user setting. To the best of our knowledge, only one paper by Kurosawa studied an entity authentication protocol with information-theoretic security, and an unilateral entity authentication protocol in the two-user setting was considered in his paper. In this paper, we extend the two-user unilateral entity authentication protocol to the multi-user one. In addition, we formally study an information-theoretically secure mutual entity authentication protocol in the multiuser setting for the first time. Specifically, we formalize a model and security definition, and derive tight lower bounds on size of users' secret-keys, and we show an optimal direct construction.
引用
收藏
页码:400 / 417
页数:18
相关论文
共 50 条
  • [1] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [2] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10
  • [3] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
    Seito, Takenobu
    Aikawa, Tadashi
    Shikata, Junji
    Matsumoto, Tsutomu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
  • [4] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [5] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 635 - 652
  • [6] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
  • [7] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [8] Parallel reducibility for information-theoretically secure computation
    Dodis, Y
    Micali, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
  • [9] Information-Theoretically Secure Multi-Party Linear Regression and Logistic Regression
    Zhou, Hengcheng
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 192 - 199
  • [10] Information-Theoretically Secure Erasure Codes for Distributed Storage
    Rashmi, K. V.
    Shah, Nihar B.
    Ramchandran, Kannan
    Kumar, P. Vijay
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) : 1621 - 1646