Abstract
Unconditional security provides security independent of assumptions regarding adversaries resources. Considerable research has been carried out into unconditionally secure authentication codes without secrecy, wherein the confidentiality of the plaintext is unimportant. Unconditionally secure encryption has been less thoroughly studied. The traditional framework for considering integrity and confidentiality in an unconditionally secure environment is that of authentication codes with secrecy. We extend this framework, in the symmetric case, to encompass aspects of recent work on unconditionally secure formulations of authentication codes and encryption systems. This will allow for a systematic analysis of unconditionally secure authenticated encryption schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
An, J., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002)
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317–330. Springer, Heidelberg (2000)
Casse, L.R.A., Martin, K.M., Wild, P.R.: Bounds and characterizations of authentication/secrecy schemes. Designs, Codes and Cryptography 13, 107–129 (1998)
De Soete, M.: Some constructions for authentication–secrecy codes. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 57–75. Springer, Heidelberg (1988)
De Soete, M.: Bounds and constructions for authentication–secrecy codes with splitting. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 311–317. Springer, Heidelberg (1990)
Desmedt, Y., Frankel, Y., Yung, M.: Multi–receiver/multi–sender network security: Efficient authenticated multicast/feedback. In: IEEE Infocom 1992, pp. 2045–2054 (1992)
Gilbert, E.N., MacWilliams, F.J., Sloane, N.J.A.: Codes which detect deception. Bell System Tech. Journal 53, 405–424 (1974)
Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally secure digital signature schemes admitting transferability. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 130–142. Springer, Heidelberg (2000)
Hanaoka, G., Shikata, J., Hanaoka, Y., Imai, H.: Unconditionally secure anonymous encryption and group authentication. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 81–99. Springer, Heidelberg (2002)
Johansson, T.: Contributions to unconditionally secure authentication. Ph.D. Thesis, Lund University, Sweden (1994)
Kurosawa, K., Obana, S.: Characterisation of (k,n) multi–receiver authentication. In: ACISP 1997. LNCS, vol. 1720, pp. 204–215 (1997)
McAven, L., Safavi–Naini, R., Yung, M.: Unconditionally secure encryption under strong attacks. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 427–439. Springer, Heidelberg (2004)
Naor, M., Yung, M.: Public–key cryptosystems provably secure against chosen–ciphertext attacks. In: 22nd STOC ACM, pp. 427–437 (1990)
Rees, R.S., Stinson, D.R.: Combinatorial characterizations of authentication codes. Designs, Codes and Cryptography 7, 239–259 (1996)
Safavi–Naini, R., Wang, H.: Multireceiver authentication codes: Models, bounds, constructions and extensions. Information and Computation 151, 148–172 (1999)
Safavi–Naini, R., McAven, L., Yung, M.: General group authentication codes and their relation to Unconditionally secure signatures. Public Key Cryptography, 231–247 (2004)
Simmons, G.J.: A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. J. Crypt. 2(2), 77–104 (1990)
Sgarro, A.: Information–theoretic bounds for authentication frauds. J. Computer Security 2, 53–63 (1993)
Shannon, C.E.: Communication theory of secrecy systems. Bell System Tech. Journal 28, 269–279 (1949)
Shikata, J., Hanaoka, G., Zheng, Y., Imai, H.: Security notions for unconditionally secure signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 434–449. Springer, Heidelberg (2002)
Shikata, J., Hanaoka, G., Zheng, Y., Matsumoto, T., Imai, H.: Unconditionally secure authenticated encryption. IEICE Trans. Fundamentals E87–A(5) (2004)
Simmons, G.J.: Authentication theory/coding theory. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 411–432. Springer, Heidelberg (1985)
Smetts, B., Vanroose, P., Wan, Z.X.: On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2, pp. 306–312 (1988)
Stinson, D.R.: Some constructions and bounds for authentication codes. J. Crypt. 1, 37–51 (1988)
Stinson, D.R.: The combinatorics of authentication and secrecy codes. J. Crypt. 2, 23–49 (1990)
Tian, X., Ding, C.: A construction of authentication codes with secrecy. Progress in Computer Science and Applied Logic 23, 319–330
Trung, T.V.: On the construction of authentication and secrecy codes. Designs, Codes and Cryptography 5, 269–280 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
McAven, L., Safavi–Naini, R., Yung, M. (2004). Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. In: Canteaut, A., Viswanathan, K. (eds) Progress in Cryptology - INDOCRYPT 2004. INDOCRYPT 2004. Lecture Notes in Computer Science, vol 3348. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30556-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-30556-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24130-0
Online ISBN: 978-3-540-30556-9
eBook Packages: Computer ScienceComputer Science (R0)