1998
DOI: 10.1007/bfb0054151
|View full text |Cite
|
Sign up to set email alerts
|

New results on multi-receiver authentication codes

Abstract: Abstract. Multi-receiver authentication is an extension of traditional point-to-point message authentication in which a sender broadcasts a single authenticated message such that all the receivers can independently verify the authenticity of the message, and malicious groups of up to a given size of receivers can not successfully impersonate the transmitter, or substitute a transmitted message. This paper presents some new resalts on unconditionally secure multi-receiver authentication codes. First we generali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
57
0

Year Published

1999
1999
2012
2012

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(58 citation statements)
references
References 14 publications
1
57
0
Order By: Relevance
“…So the way of theoretic strength provides another method to achieve secure network coding. The papers [6] [7][8] promote the development of multi-receiver authentication code. Frederique et al proposed a method [9] to prevent pollution attacks for single source node network coding, the scheme introduces unconditionally secure authentication code in multicast network, and it is robust against pollution attacks.…”
Section: Unconditionally Secure Authentication Codementioning
confidence: 99%
“…So the way of theoretic strength provides another method to achieve secure network coding. The papers [6] [7][8] promote the development of multi-receiver authentication code. Frederique et al proposed a method [9] to prevent pollution attacks for single source node network coding, the scheme introduces unconditionally secure authentication code in multicast network, and it is robust against pollution attacks.…”
Section: Unconditionally Secure Authentication Codementioning
confidence: 99%
“…Significant efforts have been made to construct nontrivial (more efficient and/or more secure) MRAs. Existing work on them in the information theoretic model includes [8][9][10], providing unconditional security. Note that all the existing MRAs were done in the shared key communication model where secrets are pre-distributed to participants.…”
Section: Introductionmentioning
confidence: 99%
“…However in this model the sender is fixed. In [18] this limitation is removed and the sender can be any group member. The extended model is called MRA-code with dynamic sender, or DMRA-codes for short.…”
Section: Introductionmentioning
confidence: 99%
“…DMRA-codes capture the essential aspect of authentication in group communication but the model allows only one sender while in many applications such as dynamic conference key distributions, group members interact with each other and more than one sender exists. Moreover, the only known non-trivial construction [18] is very inflexible and for large size groups, or large size sources, results in very inefficient constructions with many key bits and long authenticators. In summary, although DMRA-codes do provide a promising starting point for authentication in group communication, for practical applications more general, flexible and efficient models and constructions are required.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation