Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Some constructions and bounds for authentication codes
Journal of Cryptology
Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
On families of hash functions via geometric codes and concatenation
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Practical loss-resilient codes
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A new family of authentication protocols
ACM SIGOPS Operating Systems Review
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Some new bounds for cover-free families
Journal of Combinatorial Theory Series A
Broadcast anti-jamming systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Combinatorial Characterizations of Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Bucket Hashing and its Application to Fast Message Authentication
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Unlinkable Serial Transactions
FC '97 Proceedings of the First International Conference on Financial Cryptography
Fast Message Authentication Using Efficient Polynomial Evaluation
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
A graph-theoretical analysis of multicast authentication
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Digital Signatures for Flows and Multicasts
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Graph-Based Authentication of Digital Streams
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Approximate message authentication and biometric entity authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Hi-index | 0.00 |
The concept of erasure-tolerant information authentication was recently introduced to study an unconditionally secure setting where it is allowed to lose a limited number of message letters during transmission. Even if a part of the message is lost, the verifier will still be able to check the authenticity of some or all of the received message letters. In general, there might be some letters whose authenticity cannot be verified although they have arrived at the recipient's side. These letters will be discarded. We consider a special case when the verifier can always check the authenticity of all received message letters. This property is desirable since no data will be lost due to the verifier's inability to verify its authenticity (i.e., the scheme does not introduce additional degradation of the quality of the received information). We provide necessary and sufficient conditions for a set system based erasure-tolerant authentication scheme to be non-degrading. We also discuss efficient implementations and propose a provably secure stream authentication scheme that makes use of erasure-tolerant authentication codes.