Authentication codes from e-ASU hash functions with partially secret keys

Shengli Liu, Henk van Tilborg, Jian Weng, Kefei Chen

Research output: Contribution to journalArticleAcademicpeer-review

Abstract

An authentication code can be constructed with a family of ε-Almost strong universal (ε-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from ε-ASU, when the authentication key is only partially secret. We show how to apply the result to privacy amplification against active attacks in the scenario of two independent partially secret strings shared between a sender and a receiver.

Original languageEnglish
Pages (from-to)790-793
Number of pages4
JournalChinese Journal of Electronics
Volume23
Issue number4
Publication statusPublished - 1 Jan 2014

Keywords

  • Authentication code
  • Information theory
  • Privacy amplification
  • Unconditional security

Fingerprint

Dive into the research topics of 'Authentication codes from e-ASU hash functions with partially secret keys'. Together they form a unique fingerprint.

Cite this