Information-Theoretically Secure Entity Authentication in the Multi-user Setting

被引:0
|
作者
Hajime, Shogo [1 ]
Watanabe, Yohei [1 ]
Shikata, Junji [1 ]
机构
[1] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa 240, Japan
关键词
D O I
10.1007/978-3-319-12160-4_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study unilateral entity authentication protocols and mutual entity authentication protocols with information-theoretic security in the multi-user setting. To the best of our knowledge, only one paper by Kurosawa studied an entity authentication protocol with information-theoretic security, and an unilateral entity authentication protocol in the two-user setting was considered in his paper. In this paper, we extend the two-user unilateral entity authentication protocol to the multi-user one. In addition, we formally study an information-theoretically secure mutual entity authentication protocol in the multiuser setting for the first time. Specifically, we formalize a model and security definition, and derive tight lower bounds on size of users' secret-keys, and we show an optimal direct construction.
引用
收藏
页码:400 / 417
页数:18
相关论文
共 50 条
  • [41] Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
    Youngkyung Lee
    Dong Hoon Lee
    Jong Hwan Park
    Designs, Codes and Cryptography, 2020, 88 : 2433 - 2452
  • [42] Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Maidhili, Siri R.
    Karthik, G. M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [43] Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency
    Wei, Puwen
    Wang, Wei
    Zhu, Bingxin
    Yiu, Siu Ming
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 3 - 22
  • [44] Signature scheme in multi-user setting
    Tan, Chik-How
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1339 - 1345
  • [45] Secure k-NN as a Service Over Encrypted Data in Multi-User Setting
    Singh, Gagandeep
    Kaul, Akshar
    Mehta, Sameep
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 154 - 161
  • [46] Secure Simultaneous Information and Power Transfer for Downlink Multi-User Massive MIMO
    Goli, Zahra
    Razavizadeh, S. Mohammad
    Farhadi, Hamed
    Svensson, Tommy
    IEEE ACCESS, 2020, 8 : 150514 - 150526
  • [47] Enabling Verifiable and Secure Range Query in Multi-User Setting Under Cloud Environments
    Cui, Ningning
    Wang, Dong
    Zhu, Huaijie
    Li, Jianxin
    Xu, Jianliang
    Yang, Xiaochun
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (12) : 8148 - 8163
  • [48] WSN Management in a multi-user secure context
    Dragomir, Dan
    Voinescu, Andrei
    Draghici, Adriana
    Tapus, Nicolae
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [49] Secure and Scalable Multi-User Searchable Encryption
    Van Rompay, Cedric
    Molva, Refik
    Onen, Melek
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 15 - 25
  • [50] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    Almanee, Sumaya
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 843 - 864