Authentication, enhanced security and error correcting codes

Yonatan Aumann, Michael O. Rabin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

71 Scopus citations

Abstract

In electronic communications and in access to systems, the issue of authentication of the Sender S of a message M, as well as of the message itself, is of paramount importance. Recently S. Goldwasser has raised the additional issue of Deniable Authentication where the sender S authenticates the message M to the Receiver's (R) satisfaction, but can later deny his authorship of M even to an Inquisitor INQ who has listened to the exchange between S and R and who gains access to all of the the secret information used by S and R. We present two practical schemes for Deniable Authentication of messages M of arbitrary length n. In both schemes the Receiver R is assured with probability greater than 1 − 2−k, where k is a chosen security parameter, that M originated with the Sender S. Deniability is absolute in the information theoretic sense. The first scheme requires 2.4kn XOR operations on bits and one public key encoding and decoding of a short message. The second scheme requires the same number of XOR operations and k multiplications mod N, where N is some fixed product of two large primes. A key new feature of our method is the use of a Shannon-style error correction code. Traditional authentication for a long message M starts by hashing Mdown to a standard word-size. We expand M through error correction. The first Deniable Authentication method is provably valid for any encryption scheme with minimal security properties, i.e. this method is generic. The second Deniable Authentication method is provably valid under the usual assumption that factorization is intractable.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 1998 - 18th Annual International Cryptology Conference, Proceedings
EditorsHugo Krawczyk
PublisherSpringer Verlag
Pages299-303
Number of pages5
ISBN (Print)3540648925, 9783540648925
DOIs
StatePublished - 1998
Event18th Annual International Cryptology Conference, CRYPTO 1998 - Santa Barbara, United States
Duration: 23 Aug 199827 Aug 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1462
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th Annual International Cryptology Conference, CRYPTO 1998
Country/TerritoryUnited States
CitySanta Barbara
Period23/08/9827/08/98

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1998.

Fingerprint

Dive into the research topics of 'Authentication, enhanced security and error correcting codes'. Together they form a unique fingerprint.

Cite this