Skip to main content

Threshold MACs

  • Conference paper
  • First Online:
Book cover Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

Abstract

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare, J. Kilian and P. Rogaway, The security of cipher block chaining: message authentication codes, Advances in Cryptology-Crypto’94, LNCs, 839 (1994), 340–358. (Also appeared in Journal of Computer and System Sciences Vol.61, No. 3, 2000, 362-399) 239, 241

    Google Scholar 

  2. M. Bellare, R. Guerin and P. Rogaway, XOR MACs: New methods for message authentication, Advances in Cryptology-Crypto’95, LNCs, 963 (1995), 15–28.

    Google Scholar 

  3. J. Black, Message authentication codes, PhD thesis, University of California, Davis, 2000.

    Google Scholar 

  4. S.R. Blackburn. Combinatorics and Threshold Cryptography, in Combinatorial Designs and their Applications, Chapman and Hall/CRC Research Notes in Mathematics, 403, F. C. Holroyd, K.A. S. Quinn, C. Rowley and B. S. Web (Eds.), CRCPress, London (1999) 49–70. 250

    Google Scholar 

  5. D. Boneh, G. Durfee and M. Franklin, Lower Bounds for Multicast Message Authentication, Advances in Cryptology-Eurocrypt’01, Lecture Notes in Comput. Sci.

    Google Scholar 

  6. C. Boyd, Digital multisignatures, Cryptography and coding (Beker and Piper eds.), Clarendon Press, 1989, 241–246. 238

    Google Scholar 

  7. E. Brickell, G. Di Crescenzo and Y. Frankel, Sharing Block Ciphers, Information Security and Privacy, Lecture Notes in Computer Science, ACISP2000, 2000. 239

    Google Scholar 

  8. Y. Desmedt, Society and group oriented cryptology: a new concept, Advances in Cryptography-CRYPTO’ 87, Lecture Notes in Comput. Sci. 293, 1988, 120–127. 238

    Google Scholar 

  9. Y. Desmedt, Y. Frankel and M. Yung, Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom’92, (1992) 2045–2054. 239

    Google Scholar 

  10. M. van Dijk, C. Gehrmann and B. Smeets, Unconditionally Secure Group Authentication, Designs, Codes and Cryptography, 14( 1998), 281–296. 239

    Article  MATH  Google Scholar 

  11. P. Erdös, P. Frankl, and Z. Furedi, Families of finite sets in which no set is covered by the union of r others, Israel Journal of Mathematics, 51(1985), 79–89. 246, 247

    Article  MATH  MathSciNet  Google Scholar 

  12. Y. Frankel, P. MacKenzie and M. Yung, Robust efficient distributed RSA-key generation, in Proc. 30th STOC, 663–672, ACM, 1998. 238

    Google Scholar 

  13. K. Martin and R. Safavi-Naini, Multisender Authentication Schemes with Unconditional Security, Information and Communications Security, LNCS, 1334 (1997), 130–143. 239

    Chapter  Google Scholar 

  14. K. Martin, R. Safavi-Naini, H. Wang and P. Wild, Distributing the Encryption and Decryption of a Block Cipher. Preprint, 2002. 239, 244, 248, 250

    Google Scholar 

  15. S. Micali and R. Sidney. A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. Advancesin Cryptology: CRYPTO’ 95, Lecture Notes in Computer Science, 963(1995), 185–195. 239, 244

    Google Scholar 

  16. A. Shamir, How to Share a Secret, Communications of the ACM, 22 (1976), 612–613. 245

    Article  MathSciNet  Google Scholar 

  17. V. Shoup, Practical Threshold Signature, Advances in Cryptology-Eurocrypt’99, LNCS, 1807(2000), 207–222. 238

    Chapter  Google Scholar 

  18. G. J. Simmons, W.-A. Jackson and K. Martin. The Geometry of Shared Secret Schemes, Bulletin of the ICA, 1 (1991), 71–88.

    MATH  MathSciNet  Google Scholar 

  19. D. R. Stinson, T. van Trung and R. Wei, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures, J. Statist. Plan. Infer., 86(2000), 595–617. 247

    Article  MATH  Google Scholar 

  20. D. S. Stinson, R. Wei and L. Zhu, Some new bounds for cover-free families, Journal of Combinatorial Theory, A, 90(2000), 224–234. 247

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martin, K.M., Pieprzyk, J., Safavi-Naini, R., Wang, H., Wild, P.R. (2003). Threshold MACs. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics