2002
DOI: 10.1007/3-540-36178-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally Secure Anonymous Encryption and Group Authentication

Abstract: Abstract.Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic primitives containing his identity is carelessly used during the transmission. The main contribution of this paper is to study the security primitives for the above problem. In this paper, we first define unconditionally secure asymmetric encryption scheme (USAE), which is an encryption scheme with unconditional security and is impos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…As explained in [11] and [13], Homage simply validates that previously registered devices are already members of a particular group, rather than authenticating them as a group. Along similar lines, Hanaoka et al [12] define and formalize a group authentication code , with which any previously authenticated user can generate an authenticated message and send it to the receiver. The receiver is then able to verify the authenticity of the received message while maintaining the privacy of the user.…”
Section: Related Studiesmentioning
confidence: 99%
“…As explained in [11] and [13], Homage simply validates that previously registered devices are already members of a particular group, rather than authenticating them as a group. Along similar lines, Hanaoka et al [12] define and formalize a group authentication code , with which any previously authenticated user can generate an authenticated message and send it to the receiver. The receiver is then able to verify the authenticity of the received message while maintaining the privacy of the user.…”
Section: Related Studiesmentioning
confidence: 99%
“…The second notion, NM, is formalized in context of unconditional security based on the idea of that of computational security [5] [6] [14] [15]. Also, other formalization of NM in unconditional setting are also proposed in [17] [21]. The third and fourth ones, IntC and IntP, are formalized in unconditional security setting based on the idea of those in [6] where these notions are formalized in the context of symmetric encryption in terms of computational security setting.…”
Section: Key Generation and Distribution By Ta: The Tamentioning
confidence: 99%
“…Using GA-code, any authenticated user can send an authenticated message. The receiver can verify that the message has been sent from a legitimate user but at the same time retains his anonymity [31], [32].…”
Section:  Group Authentication Codes (Ga-codes)mentioning
confidence: 99%