General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"

نویسندگان

  • Reihaneh Safavi-Naini
  • Luke McAven
  • Moti Yung
چکیده

Strong notions of security for unconditionally secure digital signature schemes (USDS) were recently proposed where security is defined based on notions of security in computationally–secure digital signatures. The traditional area of unconditionally secure authentication, however, is that of “authentication codes” (A–codes). Relations between primitives is central to cryptographic research. To this end, we develop a novel “general group–based A–code” framework which includes known types of group A–codes and their extensions, including the newly proposed USDS, and also allows other models to be systematically described and analysed. In particular, information theoretic analysis of these codes can be applied to USDS, establishing fundamental bounds on USDS parameters. A second contribution herein is a modular algebraic method of synthesising group codes from simpler A–codes, such that security of the group code follows directly from the component codes. We demonstrate our approach by constructing and analysing a USDS satisfying the ‘strongest security notion’.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Further Results on Asymmetric Authentication Schemes

This paper derives some further results on unconditionally secure asym-metric authentication schemes. It starts by giving a general framework for constructing A 2-codes, identifying many known constructions as special cases. Then a full treatment of A 3-codes (A 2-codes protecting against arbiter's attacks) is given, including bounds on the parameters and optimal constructions. With these model...

متن کامل

Commitment and Authentication Systems

In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...

متن کامل

Practical Proven Secure Authentication with Arbitration

Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused. All these limitations are solved in this paper by presenting a resuable conditionally secure authentication scheme with arbiter. The scheme is unconditionally secure against denial by the sender of having sent...

متن کامل

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of users’ secret information than a tr...

متن کامل

Efficient Unconditionally Secure Digital Signatures

Digital signatures whose security does not rely on any unproven computational assumption have recently received considerable attention. While these unconditionally secure digital signatures provide a foundation for long term integrity and non-repudiation of data, currently known schemes generally require a far greater amount of memory space for the storage of secret and public keys than a tradi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004