作者: Joël Alwen , Martin Hirt , Ueli Maurer , Arpita Patra , Pavel Raykov
DOI: 10.1007/978-3-319-10879-7_27
关键词: Cryptography 、 Data Authentication Algorithm 、 Challenge–response authentication 、 Computer security 、 Authentication protocol 、 Message authentication code 、 Computer science 、 Authentication 、 Hash-based message authentication code 、 Email authentication
摘要: While standard message authentication codes (MACs) guarantee authenticity of messages, they do not, in general, the anonymity sender and recipient. For example it may be easy for an observer to determine whether or not two authenticated messages were sent by same party even without any information about secret key used. However preserving uncertainty attacker have identities honest parties engaged communication is important goal many cryptographic applications. this stated as explicit modern cellphone protocols [rGPP12] RFID based systems [Vau10].