Single-key AIL-MACs from any FIL-MAC

29Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We investigate a general paradigm for constructing arbitrary-input-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency parameter of such constructions, and give a simple and general security proof technique applicable to very general constructions. We propose concrete, essentially optimal constructions for practical use, Chain-Shift (CS) and Chain-Rotate (CR), and prove their security. They are superior to the best previously known construction, the NI-construction proposed by An and Bellare: Only one rather than two secret keys are required, the efficiency is improved, and the message space is truly AIL, i.e., there is no upper bound on the message length. The generality of our proof technique is also illustrated by giving a simple security proof of the NI-construction and several improvements thereof. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Maurer, U., & Sjödin, J. (2005). Single-key AIL-MACs from any FIL-MAC. In Lecture Notes in Computer Science (Vol. 3580, pp. 472–484). Springer Verlag. https://doi.org/10.1007/11523468_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free