Aggregate message authentication codes
J Katz, AY Lindell?- Cryptographers' Track at the RSA Conference, 2008 - Springer
We propose and investigate the notion of aggregate message authentication codes (MACs)
which have the property that multiple MAC tags, computed by (possibly) different senders on …
which have the property that multiple MAC tags, computed by (possibly) different senders on …
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF G?tzmann…?- …?Conference on Security?…, 2010 - Springer
… Aggregate message authentication codes [5] allow the aggregation of multiple MACs,
generated by different senders for possibly different messages, such that the aggregate has the …
generated by different senders for possibly different messages, such that the aggregate has the …
On the (im) possibility of aggregate message authentication codes
ACF Chan, C Castelluccia?- 2008 IEEE International?…, 2008 - ieeexplore.ieee.org
In data aggregation, multiple source nodes send their data to a sink along a concast tree with
aggregation done en route so that the sink can obtain the aggregate (which could be the …
aggregation done en route so that the sink can obtain the aggregate (which could be the …
When and how to aggregate message authentication codes on lossy channels?
Aggregation of message authentication codes (MACs) is a proven and efficient method to
preserve valuable bandwidth in resource-constrained environments: Instead of appending a …
preserve valuable bandwidth in resource-constrained environments: Instead of appending a …
Aggregate message authentication codes with detecting functionality from biorthogonal codes
Y Ogawa, S Sato, J Shikata…?- 2020 IEEE International?…, 2020 - ieeexplore.ieee.org
… Eikemeier, Marc Fischlin, Jens-Fabian G?tzmann, Anja Lehmann, Dominique Schr?der,
Peter Schr?der, and Daniel Wagner, “History-free aggregate message authentication codes, ” In …
Peter Schr?der, and Daniel Wagner, “History-free aggregate message authentication codes, ” In …
Structurally aggregate message authentication codes
Y Ishii, M Tada?- …?Symposium on Information Theory and Its?…, 2020 - ieeexplore.ieee.org
In an aggregate MAC scheme, plural (single) tags can be put together so that we can decrease
the tag size and thereby the communication cost. The aggregation ways are classified …
the tag size and thereby the communication cost. The aggregation ways are classified …
Aggregate message authentication code capable of non-adaptive group-testing
S Hirose, J Shikata?- IEEE Access, 2020 - ieeexplore.ieee.org
We introduce group-testing aggregate message authentication code (GTA MAC) and provide
its formal study. We first specify its syntax and security requirements. Then, we present a …
its formal study. We first specify its syntax and security requirements. Then, we present a …
Aggregate message authentication codes (AMACs) with on-the-fly verification
YS Chen, CL Lei?- International journal of information security, 2013 - Springer
Aggregate message authentication codes(AMACs) merge multiple authenticators for multiple
receivers in multicast networks. We investigate this security notion, revise the definition, …
receivers in multicast networks. We investigate this security notion, revise the definition, …
A secure data aggregation protocol for outlier detection in wireless sensor networks using aggregate Message Authentication Code
K Bharuka, DC Jinwala?- 2014 9th International Conference on?…, 2014 - ieeexplore.ieee.org
… In order to provide data integrity, we have used aggregate message authentication codes
(AMAC). The remainder of the paper is organized as follows. In Section II, the related work in …
(AMAC). The remainder of the paper is organized as follows. In Section II, the related work in …
Aggregate message authentication codes for DAG structures
K Tanabe, M Tada?- 2022 5th International Conference on?…, 2022 - ieeexplore.ieee.org
A message authentication code (MAC) scheme is a means for verification of a message in a
symmetric key setting. An aggregate MAC (AMAC) scheme is proposed for decreasing the …
symmetric key setting. An aggregate MAC (AMAC) scheme is proposed for decreasing the …
相关搜索
- aggregate message authentication codes dag structures
- aggregate message authentication code outlier detection
- automated analysis message authentication codes
- approximate message authentication codes
- combinatorial group testing message authentication codes
- message authentication code tag lengths
- message authentication code matrix groups
- message authentication code random oracles
- lossy channels message authentication codes
- authentication code multiple messages
- fast message authentication
- message authentication scheme
- block cipher mode message authentication
- aggregate entity authentication
- message authentication code data aggregation protocol
- message authentication code wireless sensor networks