We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system.
- Authors
Wang, Bin
- Abstract
Hazay et al. initiated the formal study of leakage‐resilient message authentication code (MAC) and presented a MAC scheme that is both leakage resilient and unforgeable against chosen message and no verification query attack (uf‐cm‐nvq). As the communication overhead of their construction is linear with the parameters that control the leakage bound, their scheme sacrifices efficiency in exchange for leakage resilience. In this study, the authors study the problem of designing leakage‐resilient MACs in the public‐key setting with acceptable communication efficiency. In particular, a notion called 'hidden identity weak hash proof system'(HID‐wHPS) is introduced. Then a generic MAC construction is presented under the abstraction framework of HID‐wHPS. Security properties guaranteed by HID‐wHPS enable us to prove the author's construction to be both leakage resilient and uf‐cm‐nvq in a modular way. Finally, performance analysis shows that their MAC construction yields improved tagging‐key size, tag size as well as computation overhead under the given leakage bound.
- Publication
IET Information Security (Wiley-Blackwell), 2016, Vol 10, Issue 4, p173
- ISSN
1751-8709
- Publication type
Article
- DOI
10.1049/iet-ifs.2014.0579