Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing

被引:6
作者
Minematsu, Kazuhiko [1 ]
Kamiya, Norifumi [1 ]
机构
[1] NEC Corp Ltd, Kawasaki, Kanagawa, Japan
来源
COMPUTER SECURITY - ESORICS 2019, PT I | 2019年 / 11735卷
关键词
MAC; Corruption detection; Combinatorial Group Testing; XOR-MAC; SECURITY;
D O I
10.1007/978-3-030-29959-0_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study a class of MACs, which we call corruption detectable MAC, that is able to not only check the integrity of the whole message, but also detect a part of the message that is corrupted. It can be seen as an application of the classical Combinatorial Group Testing (CGT) to message authentication. However, previous work on this application has an inherent limitation in its communication cost. We present a novel approach to combine CGT and a class of linear MACs (XORMAC) that breaks this limit. Our proposal, XOR-GTM, has a significantly smaller communication cost than any of the previous corruption detectable MACs, while keeping the same corruption detection capability. Our numerical examples for storage application show a reduction of communication by a factor of around 15 to 70 compared with previous schemes. XOR-GTM is parallelizable and is as efficient as standard MACs. We prove that XOR-GTM is provably secure under the standard cryptographic assumptions.
引用
收藏
页码:595 / 615
页数:21
相关论文
共 45 条
[1]  
[Anonymous], [No title captured]
[2]  
Assmus Jr. E.F., 1992, CAMBRIDGE TRACTS MAT, V103
[3]  
Atallah M. J., 2008, P 2008 ACM S INF COM, P312
[4]  
Bellare M, 1995, LECT NOTES COMPUT SC, V963, P15
[5]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403
[6]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[7]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P45, DOI 10.1145/225058.225080
[8]  
Black J, 2002, LECT NOTES COMPUT SC, V2332, P384
[9]  
Black J, 2000, LECT NOTES COMPUT SC, V1880, P197
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506