General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"
نویسندگان
چکیده
Strong notions of security for unconditionally secure digital signature schemes (USDS) were recently proposed where security is defined based on notions of security in computationally–secure digital signatures. The traditional area of unconditionally secure authentication, however, is that of “authentication codes” (A–codes). Relations between primitives is central to cryptographic research. To this end, we develop a novel “general group–based A–code” framework which includes known types of group A–codes and their extensions, including the newly proposed USDS, and also allows other models to be systematically described and analysed. In particular, information theoretic analysis of these codes can be applied to USDS, establishing fundamental bounds on USDS parameters. A second contribution herein is a modular algebraic method of synthesising group codes from simpler A–codes, such that security of the group code follows directly from the component codes. We demonstrate our approach by constructing and analysing a USDS satisfying the ‘strongest security notion’.
منابع مشابه
Further Results on Asymmetric Authentication Schemes
This paper derives some further results on unconditionally secure asym-metric authentication schemes. It starts by giving a general framework for constructing A 2-codes, identifying many known constructions as special cases. Then a full treatment of A 3-codes (A 2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these model...
متن کاملCommitment and Authentication Systems
In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...
متن کاملPractical Proven Secure Authentication with Arbitration
Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent...
متن کاملEfficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of users’ secret information than a tr...
متن کاملEfficient Unconditionally Secure Digital Signatures
Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of secret and public keys than a tradi...
متن کامل