Homomorphic authentication codes for network coding

被引:1
作者
Tang, Zhaohui [1 ]
机构
[1] Nanyang Technol Univ, Div Math Sci, Singapore 639798, Singapore
关键词
authentication codes; unconditional security; network coding; pollution attack;
D O I
10.1002/cpe.3079
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Authentication codes (A-codes) are a well studied technique to provide unconditionally secure authentication. An A-code is defined by a map that associates a pair formed by a message and a key to a tag. A-codes linear in the keys have been studied for application to distributed authentication schemes. In this paper, we address the dual question, which is the study of A-codes that are linear in the messages. This is usually an undesired property, except in the context of network coding. Regarding these A-codes, we derive some lower bounds on security parameters when key space is known. We also show a lower bound on key size when security parameter values are given (with some special properties) and construct some codes meeting the bound. We finally present a variant of these codes that authenticate multiple messages with the same key while preserving unconditional security. Copyright (C) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3892 / 3911
页数:20
相关论文
共 13 条
[1]   Homomorphic MACs: MAC-Based Integrity for Network Coding [J].
Agrawal, Shweta ;
Boneh, Dan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 :292-+
[2]  
Atici M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P16
[3]  
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68
[4]   Signatures for network coding [J].
Charles, Denis ;
Jain, Kamal ;
Lauter, Kristin .
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, :857-863
[5]   CODES WHICH DETECT DECEPTION [J].
GILBERT, EN ;
MACWILLIAMS, FJ ;
SLOANE, NJA .
BELL SYSTEM TECHNICAL JOURNAL, 1974, 53 (03) :405-424
[6]  
Izawa Kazuya, 2012, Information Security Practice and Experience. Proceedings of the 8th International Conference, ISPEC 2012, P245, DOI 10.1007/978-3-642-29101-2_17
[7]   Coding for errors and erasures in random network coding [J].
Koetter, Ralf ;
Kschischang, Frank R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) :3579-3591
[8]   An Authentication Code Against Pollution Attacks in Network Coding [J].
Oggier, Frederique ;
Fathi, Hanane .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) :1587-1596
[9]   Multireceiver authentication codes: Models, bounds, constructions, and extensions [J].
Safavi-Naini, R ;
Wang, H .
INFORMATION AND COMPUTATION, 1999, 151 (1-2) :148-172
[10]  
Simmons GJ, 1984, ADV CRYPTOLOGY CRYTO, V84, P411