Authentication codes from ε-ASU hash functions with partially secret keys

S.L. Liu, H.C.A. Tilborg, van, J. Weng, Kefei Chen

Research output: Contribution to journalArticleAcademicpeer-review

50 Downloads (Pure)

Abstract

An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We show how to apply the result to privacy amplification against active attacks in the scenario of two independent partially secret strings shared between a sender and a receiver. Keywords: Authentication code; Information theory; Privacy amplification; Unconditional security
Original languageEnglish
Pages (from-to)790-793
JournalChinese Journal of Electronics
Volume23
Issue number4
Publication statusPublished - 2014

Fingerprint Dive into the research topics of 'Authentication codes from ε-ASU hash functions with partially secret keys'. Together they form a unique fingerprint.

  • Cite this