Information-theoretically secure entity authentication in the multi-user setting

0Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we study unilateral entity authentication protocols and mutual entity authentication protocols with informationtheoretic security in the multi-user setting. To the best of our knowledge, only one paper by Kurosawa studied an entity authentication protocol with information-theoretic security, and an unilateral entity authentication protocol in the two-user setting was considered in his paper. In this paper, we extend the two-user unilateral entity authentication protocol to the multi-user one. In addition, we formally study an informationtheoretically secure mutual entity authentication protocol in the multiuser setting for the first time. Specifically, we formalize a model and security definition, and derive tight lower bounds on size of users’ secretkeys, and we show an optimal direct construction.

Cite

CITATION STYLE

APA

Hajime, S., Watanabe, Y., & Shikata, J. (2014). Information-theoretically secure entity authentication in the multi-user setting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8565, pp. 400–417). Springer Verlag. https://doi.org/10.1007/978-3-319-12160-4_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free