Information-Theoretically Secure Entity Authentication in the Multi-user Setting

被引:0
|
作者
Hajime, Shogo [1 ]
Watanabe, Yohei [1 ]
Shikata, Junji [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 240, Japan
关键词
D O I
10.1007/978-3-319-12160-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study unilateral entity authentication protocols and mutual entity authentication protocols with information-theoretic security in the multi-user setting. To the best of our knowledge, only one paper by Kurosawa studied an entity authentication protocol with information-theoretic security, and an unilateral entity authentication protocol in the two-user setting was considered in his paper. In this paper, we extend the two-user unilateral entity authentication protocol to the multi-user one. In addition, we formally study an information-theoretically secure mutual entity authentication protocol in the multiuser setting for the first time. Specifically, we formalize a model and security definition, and derive tight lower bounds on size of users' secret-keys, and we show an optimal direct construction.
引用
收藏
页码:400 / 417
页数:18
相关论文
共 50 条
  • [31] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +
  • [32] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Tonicelli, Rafael
    Nascimento, Anderson C. A.
    Dowsley, Rafael
    Mueller-Quade, Joern
    Imai, Hideki
    Hanaoka, Goichiro
    Otsuka, Akira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 73 - 84
  • [33] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Rafael Tonicelli
    Anderson C. A. Nascimento
    Rafael Dowsley
    Jörn Müller-Quade
    Hideki Imai
    Goichiro Hanaoka
    Akira Otsuka
    International Journal of Information Security, 2015, 14 : 73 - 84
  • [34] Information Theoretically Secure Encryption with Almost Free Authentication
    Alomair, Basel
    Poovendran, Radha
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (15) : 2937 - 2956
  • [35] Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications
    Liu, Xiangyu
    Liu, Shengli
    Gu, Dawu
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 664 - 673
  • [36] Security research on an information-theoretically secure secret key agreement using LDPC matrices
    Yu, Jia
    Luo, Yuan
    Li, Minglu
    PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201
  • [37] Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption
    Hu, Yanglin
    Ouyang, Yingkai
    Tomamichel, Marco
    QUANTUM, 2023, 7
  • [38] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Lee, Youngkyung
    Lee, Dong Hoon
    Park, Jong Hwan
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2433 - 2452
  • [39] Secure and efficient encrypted keyword search for multi-user setting in cloud computing
    Haijiang Wang
    Xiaolei Dong
    Zhenfu Cao
    Peer-to-Peer Networking and Applications, 2019, 12 : 32 - 42
  • [40] Secure and efficient encrypted keyword search for multi-user setting in cloud computing
    Wang, Haijiang
    Dong, Xiaolei
    Cao, Zhenfu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 32 - 42