Abstract | ||
---|---|---|
In this paper we study a generic construction of forward-secure authenticated-encryption in unidirectional, multi-receiver setting. By "multi-receiver setting" we mean the situation in which a single center transmits large data to a dynamically changing group of receivers. In such scenario a direct application of bidirectional, unicast methods would lead to multiple problems. In particular, we focus on the problem of vulnerability against a type of denial-of-service (DoS) attack. We show that this problem can be effectively resolved by a mechanism we call "MAC-then-MAC" structure. As the name suggests, this structure uses two independent MACs, but we illustrate how it can be realized without losing efficiency in transmission rate, storage size and computational overhead. Despite the fact that one of the MACs uses a constant key, our construction guarantees integrity in the sense of forward security. We provide a concrete security model showing that our construction achieves confidentiality and strong integrity (replay avoidance, in-order packet delivery, etc.) both in the sense of forward security. |
Year | Venue | Keywords |
---|---|---|
2006 | SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | authenticated encryption,strong integrity,multi-receiver setting,forward security,packet-loss detection,DoS attack,message authentication code,pseudo-random bit generator,target-collision-resistant hash-function |
Field | DocType | Citations |
Multiple encryption,Computer science,Computer security,Computer network,Encryption,40-bit encryption,Probabilistic encryption,Link encryption,On-the-fly encryption,Authenticated encryption,56-bit encryption | Conference | 0 |
PageRank | References | Authors |
0.34 | 1 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kan Yasuda | 1 | 371 | 20.87 |
Kazumaro Aoki | 2 | 918 | 67.72 |
Eiichiro Fujisaki | 3 | 1526 | 114.30 |
Atsushi Fujioka | 4 | 602 | 42.75 |