Authentication codes from ε-ASU hash functions with partially secret keys

S.L. Liu, H.C.A. Tilborg, van, J. Weng, Kefei Chen

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

136 Downloads (Pure)

Samenvatting

An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We show how to apply the result to privacy amplification against active attacks in the scenario of two independent partially secret strings shared between a sender and a receiver. Keywords: Authentication code; Information theory; Privacy amplification; Unconditional security
Originele taal-2Engels
Pagina's (van-tot)790-793
TijdschriftChinese Journal of Electronics
Volume23
Nummer van het tijdschrift4
StatusGepubliceerd - 2014

Vingerafdruk

Duik in de onderzoeksthema's van 'Authentication codes from ε-ASU hash functions with partially secret keys'. Samen vormen ze een unieke vingerafdruk.

Citeer dit