Skip to main content

Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption

  • Conference paper
Progress in Cryptology - INDOCRYPT 2004 (INDOCRYPT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3348))

Included in the following conference series:

Abstract

Unconditional security provides security independent of assumptions regarding adversaries resources. Considerable research has been carried out into unconditionally secure authentication codes without secrecy, wherein the confidentiality of the plaintext is unimportant. Unconditionally secure encryption has been less thoroughly studied. The traditional framework for considering integrity and confidentiality in an unconditionally secure environment is that of authentication codes with secrecy. We extend this framework, in the symmetric case, to encompass aspects of recent work on unconditionally secure formulations of authentication codes and encryption systems. This will allow for a systematic analysis of unconditionally secure authenticated encryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. An, J., Dodis, Y., Rabin, T.: On the security of joint signature and encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 83–107. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 317–330. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Casse, L.R.A., Martin, K.M., Wild, P.R.: Bounds and characterizations of authentication/secrecy schemes. Designs, Codes and Cryptography 13, 107–129 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  4. De Soete, M.: Some constructions for authentication–secrecy codes. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 57–75. Springer, Heidelberg (1988)

    Google Scholar 

  5. De Soete, M.: Bounds and constructions for authentication–secrecy codes with splitting. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 311–317. Springer, Heidelberg (1990)

    Google Scholar 

  6. Desmedt, Y., Frankel, Y., Yung, M.: Multi–receiver/multi–sender network security: Efficient authenticated multicast/feedback. In: IEEE Infocom 1992, pp. 2045–2054 (1992)

    Google Scholar 

  7. Gilbert, E.N., MacWilliams, F.J., Sloane, N.J.A.: Codes which detect deception. Bell System Tech. Journal 53, 405–424 (1974)

    MathSciNet  Google Scholar 

  8. Hanaoka, G., Shikata, J., Zheng, Y., Imai, H.: Unconditionally secure digital signature schemes admitting transferability. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 130–142. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Hanaoka, G., Shikata, J., Hanaoka, Y., Imai, H.: Unconditionally secure anonymous encryption and group authentication. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 81–99. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Johansson, T.: Contributions to unconditionally secure authentication. Ph.D. Thesis, Lund University, Sweden (1994)

    Google Scholar 

  11. Kurosawa, K., Obana, S.: Characterisation of (k,n) multi–receiver authentication. In: ACISP 1997. LNCS, vol. 1720, pp. 204–215 (1997)

    Google Scholar 

  12. McAven, L., Safavi–Naini, R., Yung, M.: Unconditionally secure encryption under strong attacks. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 427–439. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. Naor, M., Yung, M.: Public–key cryptosystems provably secure against chosen–ciphertext attacks. In: 22nd STOC ACM, pp. 427–437 (1990)

    Google Scholar 

  14. Rees, R.S., Stinson, D.R.: Combinatorial characterizations of authentication codes. Designs, Codes and Cryptography 7, 239–259 (1996)

    MATH  MathSciNet  Google Scholar 

  15. Safavi–Naini, R., Wang, H.: Multireceiver authentication codes: Models, bounds, constructions and extensions. Information and Computation 151, 148–172 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  16. Safavi–Naini, R., McAven, L., Yung, M.: General group authentication codes and their relation to Unconditionally secure signatures. Public Key Cryptography, 231–247 (2004)

    Google Scholar 

  17. Simmons, G.J.: A Cartesian product construction for unconditionally secure authentication codes that permit arbitration. J. Crypt. 2(2), 77–104 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  18. Sgarro, A.: Information–theoretic bounds for authentication frauds. J. Computer Security 2, 53–63 (1993)

    Google Scholar 

  19. Shannon, C.E.: Communication theory of secrecy systems. Bell System Tech. Journal 28, 269–279 (1949)

    Google Scholar 

  20. Shikata, J., Hanaoka, G., Zheng, Y., Imai, H.: Security notions for unconditionally secure signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 434–449. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  21. Shikata, J., Hanaoka, G., Zheng, Y., Matsumoto, T., Imai, H.: Unconditionally secure authenticated encryption. IEICE Trans. Fundamentals E87–A(5) (2004)

    Google Scholar 

  22. Simmons, G.J.: Authentication theory/coding theory. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 411–432. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  23. Smetts, B., Vanroose, P., Wan, Z.X.: On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2, pp. 306–312 (1988)

    Google Scholar 

  24. Stinson, D.R.: Some constructions and bounds for authentication codes. J. Crypt. 1, 37–51 (1988)

    MATH  MathSciNet  Google Scholar 

  25. Stinson, D.R.: The combinatorics of authentication and secrecy codes. J. Crypt. 2, 23–49 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  26. Tian, X., Ding, C.: A construction of authentication codes with secrecy. Progress in Computer Science and Applied Logic 23, 319–330

    Google Scholar 

  27. Trung, T.V.: On the construction of authentication and secrecy codes. Designs, Codes and Cryptography 5, 269–280 (1995)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McAven, L., Safavi–Naini, R., Yung, M. (2004). Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. In: Canteaut, A., Viswanathan, K. (eds) Progress in Cryptology - INDOCRYPT 2004. INDOCRYPT 2004. Lecture Notes in Computer Science, vol 3348. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30556-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30556-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24130-0

  • Online ISBN: 978-3-540-30556-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics