Information-Theoretically Secure Entity Authentication in the Multi-user Setting

被引:0
|
作者
Hajime, Shogo [1 ]
Watanabe, Yohei [1 ]
Shikata, Junji [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 240, Japan
关键词
D O I
10.1007/978-3-319-12160-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study unilateral entity authentication protocols and mutual entity authentication protocols with information-theoretic security in the multi-user setting. To the best of our knowledge, only one paper by Kurosawa studied an entity authentication protocol with information-theoretic security, and an unilateral entity authentication protocol in the two-user setting was considered in his paper. In this paper, we extend the two-user unilateral entity authentication protocol to the multi-user one. In addition, we formally study an information-theoretically secure mutual entity authentication protocol in the multiuser setting for the first time. Specifically, we formalize a model and security definition, and derive tight lower bounds on size of users' secret-keys, and we show an optimal direct construction.
引用
收藏
页码:400 / 417
页数:18
相关论文
共 50 条
  • [21] PERCOLATION ON THE INFORMATION-THEORETICALLY SECURE SIGNAL TO INTERFERENCE RATIO GRAPH
    Vaze, Rahul
    Iyer, Srikanth
    JOURNAL OF APPLIED PROBABILITY, 2014, 51 (04) : 910 - 920
  • [22] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [23] Information-Theoretically Secure and Highly Efficient Search and Row Retrieval
    Sharma, Shantanu
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Kumari, Komal
    Roychoudhury, Swagnik
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (10): : 2391 - 2403
  • [24] ITSEC: An Information-theoretically Secure Framework for Truthful Spectrum Auctions
    Chen, Zhili
    Huang, Liusheng
    Chen, Lin
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [25] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606
  • [26] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [27] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [28] Information-Theoretically Secure String Commitments Based on Packet Reordering Channels
    de Morais Alves, Vinicius
    Dowsley, Rafael
    de Sousa, Rafael Timoteo, Jr.
    Nascimento, Anderson C. A.
    IEEE ACCESS, 2021, 9 : 139928 - 139945
  • [29] Information-theoretically secure key insulated encryption: Models, bounds and constructions
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (10) : 2521 - 2532
  • [30] A generic construction of tightly secure signatures in the multi-user setting
    Zhang, Xiao
    Liu, Shengli
    Gu, Dawu
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2019, 775 : 32 - 52