Group-Testing Aggregate Entity Authentication

被引:1
作者
Hirose, Shoichi [1 ]
Shikata, Junji [2 ]
机构
[1] Univ Fukui, Fac Engn, Fukui, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Japan
来源
2023 IEEE INFORMATION THEORY WORKSHOP, ITW | 2023年
关键词
entity authentication; message authentication; aggregate MAC; group testing;
D O I
10.1109/ITW55543.2023.10160240
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication scheme, if a server has to authenticate a large number of entities simultaneously, for example, in an IoT network, aggregate MAC is applicable. Aggregate MAC allows multiple tags (responses to the challenge) of entities to be aggregated into a single short tag so that the server can authenticate the entities only with it. If the pair of a challenge and the corresponding aggregate tag is valid, then all the involved entities are valid. However, a drawback of this method is that the server cannot identify invalid entities if they exist. We propose group-testing aggregate entity authentication by adapting group testing for entity authentication using aggregate MAC to solve this problem. We formalize its security requirements and reduces the security of our generic construction to that of aggregate MAC and group testing. We also extend our generic construction to produce a secure scheme from a weaker but efficient and plausible aggregate MAC scheme.
引用
收藏
页码:227 / 231
页数:5
相关论文
共 12 条
  • [1] Bellare M., 1993, P 1 ACM C COMP COMM, P62
  • [2] The detection of defective members of large populations
    Dorfman, R
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1943, 14 : 436 - 440
  • [3] Du D., 2000, COMBINATORIAL GROUP, V12
  • [4] Eikemeier O, 2010, LECT NOTES COMPUT SC, V6280, P309, DOI 10.1007/978-3-642-15317-4_20
  • [5] Goodrich MT, 2005, LECT NOTES COMPUT SC, V3531, P206
  • [6] Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing
    Hirose, Shoichi
    Shikata, Junji
    [J]. IEEE ACCESS, 2020, 8 : 216116 - 216126
  • [7] Non-adaptive Group-Testing Aggregate MAC Scheme
    Hirose, Shoichi
    Shikata, Junji
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 357 - 372
  • [8] Katz J, 2008, LECT NOTES COMPUT SC, V4964, P155, DOI 10.1007/978-3-540-79263-5_10
  • [9] Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing
    Minematsu, Kazuhiko
    Kamiya, Norifumi
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 595 - 615
  • [10] Efficient Message Authentication Codes with Combinatorial Group Testing
    Minematsu, Kazuhiko
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 185 - 202