研究成果

国際会議

  • Sequential Aggregate Authentication Codes with Information Theoretic Security
    著者
    S. Tomita, Y. Watanabe, and J. Shikata
    会議名
    CISS 2016
    ページ
    192–197
    出版社
    IEEE
    発行年
    2016
    Abstract

    Sequential aggregate signature (SAS) schemes provide a single, compact signature, which is generated from a number of signatures, that simultaneously ensures that each signature is legally generated from the corresponding message with a defined order. Although SAS schemes have various applications such as a secure border gateway protocol, all existing schemes are computationally secure (i.e., assuming computationally bounded adversaries). In this paper, we first propose sequential aggregate authentication codes (SAA-codes), which has similar functionality of SAS in the information theoretic security setting. Specifically, we give a model and security formalization of SAA-codes, derive lower bounds on sizes of secret keys and authenticators required in secure SAA-codes, and present two kinds of optimal constructions in the sense that each construction meets the lower bounds with equalities.