Key Recycling in Authentication

@article{Portmann2012KeyRI,
  title={Key Recycling in Authentication},
  author={Christopher Portmann},
  journal={IEEE Transactions on Information Theory},
  year={2012},
  volume={60},
  pages={4383-4396}
}
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 38 references

A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

  • N. Walenta
  • New J. Phys., vol. 16, no. 1, p. 013047, 2014.
  • 2014
1 Excerpt

Security of Authentication With a Fixed Key in Quantum Key Distribution [Online]. Avalible: http://arxiv.org/abs/1109.5168

  • A. Abidin, J. Larsson
  • IEEE TRANSACTIONS ON INFORMATION THEORY,
  • 2011
3 Excerpts

Similar Papers

Loading similar papers…