Key-Indistinguishable Message Authentication Codes

作者: Joël Alwen , Martin Hirt , Ueli Maurer , Arpita Patra , Pavel Raykov

DOI: 10.1007/978-3-319-10879-7_27

关键词: CryptographyData Authentication AlgorithmChallenge–response authenticationComputer securityAuthentication protocolMessage authentication codeComputer scienceAuthenticationHash-based message authentication codeEmail authentication

摘要: While standard message authentication codes (MACs) guarantee authenticity of messages, they do not, in general, the anonymity sender and recipient. For example it may be easy for an observer to determine whether or not two authenticated messages were sent by same party even without any information about secret key used. However preserving uncertainty attacker have identities honest parties engaged communication is important goal many cryptographic applications. this stated as explicit modern cellphone protocols [rGPP12] RFID based systems [Vau10].

参考文章(27)
Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel, A New RFID Privacy Model Computer Security – ESORICS 2011. pp. 568- 587 ,(2011) , 10.1007/978-3-642-23822-2_31
Joe-Kai Tsay, Stig F. Mjølsnes, A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols Lecture Notes in Computer Science. ,vol. 7531, pp. 65- 76 ,(2012) , 10.1007/978-3-642-33704-8_6
Abhishek Banerjee, Chris Peikert, Alon Rosen, Pseudorandom Functions and Lattices Advances in Cryptology – EUROCRYPT 2012. pp. 719- 737 ,(2012) , 10.1007/978-3-642-29011-4_42
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi, Anonymity-Preserving Public-Key Encryption: A Constructive Approach Privacy Enhancing Technologies. pp. 19- 39 ,(2013) , 10.1007/978-3-642-39077-7_2
Robert H Deng, Yingjiu Li, Moti Yung, Yunlei Zhao, None, A zero-knowledge based framework for RFID privacy Journal of Computer Security. ,vol. 19, pp. 1109- 1146 ,(2011) , 10.3233/JCS-2011-0440
Serge Vaudenay, Privacy models for RFID schemes radio frequency identification security and privacy issues. pp. 65- 65 ,(2010) , 10.1007/978-3-642-16822-2_6
Tetsu Iwata, Kaoru Kurosawa, OMAC: One-Key CBC MAC Fast Software Encryption. pp. 129- 153 ,(2003) , 10.1007/978-3-540-39887-5_11
Brent Waters, Efficient identity-based encryption without random oracles theory and application of cryptographic techniques. ,vol. 3494, pp. 114- 127 ,(2005) , 10.1007/11426639_7
Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Myrto Arapinis, Formal Analysis of UMTS Privacy arXiv: Cryptography and Security. ,(2011)
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson, Anonymity guarantees of the UMTS/LTE authentication and connection protocol International Journal of Information Security. ,vol. 13, pp. 513- 527 ,(2014) , 10.1007/S10207-014-0231-3