메뉴 건너뛰기




Volumn 7237 LNCS, Issue , 2012, Pages 355-374

Message authentication, revisited

Author keywords

[No Author keywords available]

Indexed keywords

CHOSEN MESSAGE ATTACKS; GENERIC TRANSFORMATIONS; IDENTIFICATION PROTOCOL; IDENTIFICATION SCHEME; MESSAGE AUTHENTICATION; MESSAGE AUTHENTICATION CODES; OPEN PROBLEMS; PROOF SYSTEM; PSEUDO-RANDOM FUNCTIONS; SYMMETRIC KEYS; UNFORGEABILITY;

EID: 84859941399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29011-4_22     Document Type: Conference Paper
Times cited : (80)

References (40)
  • 1
    • 77954625601 scopus 로고    scopus 로고
    • Efficient lattice (H)IBE in the standard model
    • Gilbert, H. (ed.) EUROCRYPT 2010 Springer, Heidelberg
    • Agrawal, S., Boneh, D., Boyen, X.: Efficient Lattice (H)IBE in the Standard Model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553-572. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 553-572
    • Agrawal, S.1    Boneh, D.2    Boyen, X.3
  • 2
    • 70350342511 scopus 로고    scopus 로고
    • Fast cryptographic primitives and circular-secure encryption based on hard learning problems
    • Halevi, S. (ed.) CRYPTO 2009 Springer, Heidelberg
    • Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 595-618
    • Applebaum, B.1    Cash, D.2    Peikert, C.3    Sahai, A.4
  • 4
    • 33749544409 scopus 로고    scopus 로고
    • New proofs for NMAC and HMAC: Security without collision-resistance
    • Dwork, C. (ed.) CRYPTO 2006 Springer, Heidelberg
    • Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 5
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Koblitz, N. (ed.) CRYPTO 1996 Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom functions revisited: The cascade construction and its concrete security
    • IEEE Computer Society Press (October)
    • Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: 37th Annual Symposium on Foundations of Computer Science, pp. 514-523. IEEE Computer Society Press (October 1996)
    • (1996) 37th Annual Symposium on Foundations of Computer Science , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 33745136125 scopus 로고    scopus 로고
    • Improved security analyses for CBC MACs
    • Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
    • Bellare, M., Pietrzak, K., Rogaway, P.: Improved Security Analyses for CBC MACs. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 527-545. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 527-545
    • Bellare, M.1    Pietrzak, K.2    Rogaway, P.3
  • 9
    • 84947906522 scopus 로고    scopus 로고
    • The exact security of digital signatures-how to sign with RSA and rabin
    • Maurer, U.M. (ed.) EUROCRYPT 1996 Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The Exact Security of Digital Signatures-How to Sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399-416. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1070 , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 11
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004 Springer, Heidelberg
    • Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56-73. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 12
    • 24944435537 scopus 로고    scopus 로고
    • Compact E-Cash
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 302-321
    • Camenisch, J.L.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 13
    • 44449176564 scopus 로고    scopus 로고
    • The twin diffie-hellman problem and applications
    • Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
    • Cash, D.M., Kiltz, E., Shoup, V.: The Twin Diffie-Hellman Problem and Applications. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 127-145. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 127-145
    • Cash, D.M.1    Kiltz, E.2    Shoup, V.3
  • 14
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998 Springer, Heidelberg
    • Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 15
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002 Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 16
    • 38349029412 scopus 로고    scopus 로고
    • Improving the security of MACs via randomized message preprocessing
    • Biryukov, A. (ed.) FSE 2007 Springer, Heidelberg
    • Dodis, Y., Pietrzak, K.: Improving the Security of MACs Via Randomized Message Preprocessing. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 414-433. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593 , pp. 414-433
    • Dodis, Y.1    Pietrzak, K.2
  • 17
    • 24144481228 scopus 로고    scopus 로고
    • A verifiable random function with short proofs and keys
    • Vaudenay, S. (ed.) PKC 2005 Springer, Heidelberg
    • Dodis, Y., Yampolskiy, A.: A Verifiable Random Function with Short Proofs and Keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 416-431
    • Dodis, Y.1    Yampolskiy, A.2
  • 18
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Odlyzko, A.M. (ed.) CRYPTO 1986 Springer, Heidelberg
    • Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 19
    • 49149109143 scopus 로고    scopus 로고
    • How to encrypt with the LPN problem
    • Aceto, L., Damǧard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II Springer, Heidelberg
    • Gilbert, H., Robshaw, M., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damǧard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 679-690. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 679-690
    • Gilbert, H.1    Robshaw, M.2    Seurin, Y.3
  • 20
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 21
    • 79955548922 scopus 로고    scopus 로고
    • Simple and efficient public-key encryption from computational diffie-hellman in the standard model
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010 Springer, Heidelberg
    • Haralambiev, K., Jager, T., Kiltz, E., Shoup, V.: Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 1-18. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 1-18
    • Haralambiev, K.1    Jager, T.2    Kiltz, E.3    Shoup, V.4
  • 22
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • Menezes, A. (ed.) CRYPTO 2007 Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Secure Hybrid Encryption from Weakened Key Encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 23
    • 67650677267 scopus 로고    scopus 로고
    • Practical chosen ciphertext secure encryption from factoring
    • Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical Chosen Ciphertext Secure Encryption from Factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 24
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Boyd, C. (ed.) ASIACRYPT 2001 Springer, Heidelberg
    • Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52-66. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 25
    • 84949450111 scopus 로고    scopus 로고
    • On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
    • Daemen, J., Rijmen, V. (eds.) FSE 2002 Springer, Heidelberg
    • Jaulmes, É., Joux, A., Valette, F.: On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 237-251. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2365 , pp. 237-251
    • Jaulmes, É.1    Joux, A.2    Valette, F.3
  • 26
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Shoup, V. (ed.) CRYPTO 2005 Springer, Heidelberg
    • Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 27
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • Vaudenay, S. (ed.) EUROCRYPT 2006 Springer, Heidelberg
    • Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 28
    • 77954759293 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB+ protocols. Journal of Cryptology 23(3), 402-421 (2010)
    • (2010) Journal of Cryptology , vol.23 , Issue.3 , pp. 402-421
    • Katz, J.1    Shin, J.S.2    Smith, A.3
  • 29
    • 79957999442 scopus 로고    scopus 로고
    • Efficient authentication from hard learning problems
    • Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient Authentication from Hard Learning Problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7-26. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 7-26
    • Kiltz, E.1    Pietrzak, K.2    Cash, D.3    Jain, A.4    Venturi, D.5
  • 30
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995 Springer, Heidelberg
    • Krawczyk, H.: New Hash Functions for Message Authentication. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 301-310. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 301-310
    • Krawczyk, H.1
  • 31
    • 35048835796 scopus 로고    scopus 로고
    • A new paradigm of hybrid encryption scheme
    • Franklin, M. (ed.) CRYPTO 2004 Springer, Heidelberg
    • Kurosawa, K., Desmedt, Y.: A New Paradigm of Hybrid Encryption Scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 33
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudo-random functions
    • IEEE Computer Society Press October
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th Annual Symposium on Foundations of Computer Science, pp. 458-467. IEEE Computer Society Press (October 1997)
    • (1997) 38th Annual Symposium on Foundations of Computer Science , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 34
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from macs (extended abstract)
    • Krawczyk, H. (ed.) CRYPTO 1998 Springer, Heidelberg
    • Naor, M., Reingold, O.: From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 267-282. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 267-282
    • Naor, M.1    Reingold, O.2
  • 36
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • Brickell, E.F. (ed.) CRYPTO 1992 Springer, Heidelberg
    • Okamoto, T.: Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31-53. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 37
    • 70350642078 scopus 로고    scopus 로고
    • Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract
    • Mitzenmacher, M. (ed.) ACM Press (May/June
    • Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Mitzenmacher, M. (ed.) 41st Annual ACM Symposium on Theory of Computing, pp. 333-342. ACM Press (May/June 2009)
    • (2009) 41st Annual ACM Symposium on Theory of Computing , pp. 333-342
    • Peikert, C.1
  • 38
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • Stinson, D.R. (ed.) CRYPTO 1993 Springer, Heidelberg
    • Stern, J.: A New Identification Scheme Based on Syndrome Decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13-21. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 13-21
    • Stern, J.1
  • 39
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. (ed.) EUROCRYPT 2005 Springer, Heidelberg
    • Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 40
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22, 265-279 (1981)
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.