Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized (identity-based) hash proof system and its applications

In this work, we generalize the paradigm of hash proof system (HPS) proposed by Cramer and Shoup [CS02]. In the central of our generalization, we lift subset membership problem to distribution distinguish problem. Our generalized HPS clarifies and encompass all the known publickey encryption (PKE) schemes that essentially implement the idea of hash proof system. Moreover, besides existing smoot...

متن کامل

Identity Based Message Authentication for Dynamic Networks

This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...

متن کامل

Hash Proof System Based on Lattice

We present a hash proof systems (HPS)based on hard lattice problems including learning with error (LWE) and inhomogeneous small integer solution (ISIS). Different from the HPS in past, ours is with error. That is to say, the deterministic private evaluation algorithm is not always equivalent to the deterministic public evaluation algorithm. The difference between them is one or zero. We also sh...

متن کامل

Comparative Study of DECIM-128 and DECIMV2 in relation to Compact Hash-based Message Authentication Code

constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement hashing for highly compact MAC, whi...

متن کامل

An 80Gbps FPGA Implementation of a Universal Hash Function based Message Authentication Code

We developed an architecture optimization technique called divide-and-concatenate and applied it to a cryptographic message authentication code (MAC). This is based on two key observations: (i) The area of a multiplier and associated data path decreases quadratically and their speeds increase gradually as their operand size is reduced. (ii) Two w-bit universal hash function data paths (each wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IET Information Security

سال: 2016

ISSN: 1751-8709,1751-8717

DOI: 10.1049/iet-ifs.2014.0579