Efficient Message Authentication Codes with Combinatorial Group Testing

被引:9
|
作者
Minematsu, Kazuhiko [1 ]
机构
[1] NEC Corp Ltd, Kawasaki, Kanagawa 213, Japan
来源
关键词
Message authentication code; Combinatorial group testing; Data corruption; Provable security; CONSTRUCTIONS; SECURITY; DESIGN;
D O I
10.1007/978-3-319-24174-6_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can not identify which part is corrupted in case of invalid message. In this paper we study a class of MAC functions that enables to identify the part of corruption, which we call group testing MAC (GTM). This can be seen as an application of a classical (non-adaptive) combinatorial group testing to MAC. Although the basic concept of GTM (or its keyless variant) has been proposed in various application areas, such as data forensics and computer virus testing, they rather treat the underlying MAC function as a black box, and exact computation cost for GTM seems to be overlooked. In this paper, we study the computational aspect of GTM, and show that a simple yet non-trivial extension of parallelizable MAC (PMAC) enables O(m + t) computation for m data items and t tests, irrespective of the underlying test matrix we use, under a natural security model. This greatly improves efficiency from naively applying a black-box MAC for each test, which requires O(mt) time. Based on existing group testing methods, we also present experimental results of our proposal and observe that ours runs as fast as taking single MAC tag, with speed-up from the conventional method by factor around 8 to 15 for m = 10(4) to 10(5) items.
引用
收藏
页码:185 / 202
页数:18
相关论文
共 50 条
  • [21] Combinatorial constructions for optimal splitting authentication codes
    Ge, GN
    Miao, Y
    Wang, LH
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2005, 18 (04) : 663 - 678
  • [22] Combinatorial bounds and characterizations of splitting authentication codes
    Michael Huber
    [J]. Cryptography and Communications, 2010, 2 : 173 - 185
  • [23] Combinatorial classification of optimal authentication codes with arbitration
    Obana, S
    Kurosawa, K
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 281 - 305
  • [24] On the (Im)possibility of blind message authentication codes
    Abdalla, M
    Namprempre, C
    Neven, G
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 262 - 279
  • [25] Side channel attacks on message authentication codes
    Okeya, K
    Iwata, T
    [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2005, 3813 : 205 - 217
  • [26] Quantum-Secure Message Authentication Codes
    Boneh, Dan
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 592 - 608
  • [27] Message authentication codes with error correcting capabilities
    Lam, CCY
    Gong, G
    Vanstone, SA
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 354 - 366
  • [28] Reliability of Soft Verification of Message Authentication Codes
    Zivic, Natasa
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2013, : 191 - 196
  • [29] On the (Im)possibility of Aggregate Message Authentication Codes
    Chan, Aldar C-F.
    Castelluccia, Claude
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 235 - +
  • [30] New combinatorial structures with applications to efficient group testing with inhibitors
    De Bonis, Annalisa
    [J]. JOURNAL OF COMBINATORIAL OPTIMIZATION, 2008, 15 (01) : 77 - 94