Aggregate Entity Authentication Identifying Invalid Entities with Group Testing
نویسندگان
چکیده
It is common to implement challenge-response entity authentication with a MAC function. In such an scheme, aggregate effective when server needs authenticate many entities. Aggregate aggregates multiple tags (responses challenge) generated by entities into one short tag so that the can be authenticated simultaneously regarding only tag. Then, all associated are valid if pair of challenge and valid. However, drawback this approach invalid cannot identified they exist. To resolve drawback, we propose group-testing incorporating group testing using MAC. We first formalize security requirements present generic construction. reduce construction testing. also enhance instantiate secure scheme from simple practical but weaker scheme. Finally, show some results on performance evaluation.
منابع مشابه
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for au...
متن کاملApproximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way to provide data authentication that is tolerant to acceptable modifications of the original message. Although constructs had been proposed for this primitive, no security analysis or even...
متن کاملIs Entity Authentication Necessary?
Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies, and to use the findings of this investigation as input for the design of authentication protocols suitable fo...
متن کاملPrinciples for Entity Authentication
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a core set of roles that enables us to extract general principles that should be followed to avoid attacks. We then formalize these principles in terms of rules for protocol parties and we ...
متن کاملUnconditionally Secure Entity Authentication
This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are innnitely powerful. We rst derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme that meets all our bounds.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12112479