A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Communication complexity
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
New paradigms in signature schemes
New paradigms in signature schemes
Secure hierarchical in-network aggregation in sensor networks
Proceedings of the 13th ACM conference on Computer and communications security
Compact sequential aggregate signatures
Proceedings of the 2007 ACM symposium on Applied computing
Proceedings of the 14th ACM conference on Computer and communications security
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Identity-Based aggregate signatures
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
History-free aggregate message authentication codes
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
The case for ubiquitous transport-level encryption
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Protecting and restraining the third party in RFID-enabled 3PL supply chains
ICISS'10 Proceedings of the 6th international conference on Information systems security
How to aggregate the CL signature scheme
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Verifying and enforcing network paths with icing
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Hash function combiners in TLS and SSL
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
MAC aggregation protocols resilient to DoS attacks
International Journal of Security and Networks
MAC aggregation with message multiplicity
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
A privacy-preserving path-checking solution for RFID-Based supply chains
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Secure and energy-efficient data aggregation for wireless sensor networks
International Journal of Mobile Network Design and Innovation
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
Hi-index | 0.00 |
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for authenticated communication in mobile ad-hoc networks or other settings where resource-constrained devices share distinct keys with a single entity (such as a base station), and communication is an expensive resource.