Aggregate message authentication codes

J Katz, AY Lindell?- Cryptographers' Track at the RSA Conference, 2008 - Springer
We propose and investigate the notion of aggregate message authentication codes (MACs)
which have the property that multiple MAC tags, computed by (possibly) different senders on …

History-free aggregate message authentication codes

O Eikemeier, M Fischlin, JF G?tzmann…?- …?Conference on Security?…, 2010 - Springer
Aggregate message authentication codes [5] allow the aggregation of multiple MACs,
generated by different senders for possibly different messages, such that the aggregate has the …

On the (im) possibility of aggregate message authentication codes

ACF Chan, C Castelluccia?- 2008 IEEE International?…, 2008 - ieeexplore.ieee.org
In data aggregation, multiple source nodes send their data to a sink along a concast tree with
aggregation done en route so that the sink can obtain the aggregate (which could be the …

When and how to aggregate message authentication codes on lossy channels?

E Wagner, M Serror, K Wehrle, M Henze?- International Conference on?…, 2024 - Springer
Aggregation of message authentication codes (MACs) is a proven and efficient method to
preserve valuable bandwidth in resource-constrained environments: Instead of appending a …

Aggregate message authentication codes with detecting functionality from biorthogonal codes

Y Ogawa, S Sato, J Shikata…?- 2020 IEEE International?…, 2020 - ieeexplore.ieee.org
… Eikemeier, Marc Fischlin, Jens-Fabian G?tzmann, Anja Lehmann, Dominique Schr?der,
Peter Schr?der, and Daniel Wagner, “History-free aggregate message authentication codes, ” In …

Structurally aggregate message authentication codes

Y Ishii, M Tada?- …?Symposium on Information Theory and Its?…, 2020 - ieeexplore.ieee.org
In an aggregate MAC scheme, plural (single) tags can be put together so that we can decrease
the tag size and thereby the communication cost. The aggregation ways are classified …

Aggregate message authentication code capable of non-adaptive group-testing

S Hirose, J Shikata?- IEEE Access, 2020 - ieeexplore.ieee.org
We introduce group-testing aggregate message authentication code (GTA MAC) and provide
its formal study. We first specify its syntax and security requirements. Then, we present a …

Aggregate message authentication codes (AMACs) with on-the-fly verification

YS Chen, CL Lei?- International journal of information security, 2013 - Springer
Aggregate message authentication codes(AMACs) merge multiple authenticators for multiple
receivers in multicast networks. We investigate this security notion, revise the definition, …

A secure data aggregation protocol for outlier detection in wireless sensor networks using aggregate Message Authentication Code

K Bharuka, DC Jinwala?- 2014 9th International Conference on?…, 2014 - ieeexplore.ieee.org
… In order to provide data integrity, we have used aggregate message authentication codes
(AMAC). The remainder of the paper is organized as follows. In Section II, the related work in …

Aggregate message authentication codes for DAG structures

K Tanabe, M Tada?- 2022 5th International Conference on?…, 2022 - ieeexplore.ieee.org
A message authentication code (MAC) scheme is a means for verification of a message in a
symmetric key setting. An aggregate MAC (AMAC) scheme is proposed for decreasing the …