A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Universal one-way hash functions and their cryptographic applications
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
One-way functions are necessary and sufficient for secure signatures
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
On the design of provably-secure cryptographic hash functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Multireceiver authentication code4: models, bounds, constructions, and extensions
Information and Computation
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Characterisation of (k, n) Multi-receiver Authentication
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Digital Signatures for Flows and Multicasts
Digital Signatures for Flows and Multicasts
A graph-theoretical analysis of multicast authentication
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Collusion-Resistant Message Authentication in Overlay Multicast Communication
Transactions on Computational Science IV
Robust and efficient authentication of video stream broadcasting
ACM Transactions on Information and System Security (TISSEC)
The ForwardDiffsig scheme for multicast authentication
IEEE/ACM Transactions on Networking (TON)
Authenticated queries in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A practical clumped-tree multicast encryption scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Hi-index | 0.00 |
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the "multicast MAC", which is a natural generalization to multiple receivers. We prove that one cannot build a short and efficient collusion resistant multicast MAC without a new advance in digital signature design.