1996
DOI: 10.1007/3-540-68697-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Universal Hashing and Multiple Authentication

Abstract: Abstract. In this paper, we study unconditionally secure codes that provide authentication without secrecy.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
49
0

Year Published

1997
1997
2013
2013

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(50 citation statements)
references
References 10 publications
1
49
0
Order By: Relevance
“…In addition to secrecy, we also need to ensure authenticity of the communication between the components. We observe that this can be done easily using information-theoretic MAC schemes based on universalhashing [33,3]. Roughly, each pair of components will maintain rolling MAC keys that are only used Θ(1) times.…”
Section: From Ocl + To Ldsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to secrecy, we also need to ensure authenticity of the communication between the components. We observe that this can be done easily using information-theoretic MAC schemes based on universalhashing [33,3]. Roughly, each pair of components will maintain rolling MAC keys that are only used Θ(1) times.…”
Section: From Ocl + To Ldsmentioning
confidence: 99%
“…3 Then, "prove" to HW that indeed e = Eval pk (Ĉ, U s,v ). In case HW is "convinced", it decrypts C (v) = Dec sk (e) and returns the result to the evaluator.…”
Section: The Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…A complexity-theoretical secure MAC for multiple use can easily be obtained from the unconditionally secure by changing the key part zi by the output of a pseudo random function, see for example [2]. Recently, in [11] a new method for multiple authentication was proposed. This method does not use a refreshed key part and, hence, it does not require the z~ (called counter in [11]) for multiple authentication.…”
Section: A Multiple Message Macmentioning
confidence: 99%
“…Recently, in [11] a new method for multiple authentication was proposed. This method does not use a refreshed key part and, hence, it does not require the z~ (called counter in [11]) for multiple authentication. Consequently there is no problem if one or several messages are lost during transmission.…”
Section: A Multiple Message Macmentioning
confidence: 99%