Abstract
In this paper we propose a new lightweight authentication protocol which is efficient, reliable and, properly instantiated, suitable for the post-quantum world. It is a two-level protocol, which supports unbounded message transmission. It can be useful in several settings, from the standard sender-receiver setting, to unreliable multicast and broadcast communication in networks with resource-constrained devices. The key ideas underlying our design are mainly three: the hash-chaining method, some techniques used in MAC-based authentication protocols for multicast communication, and the use of the Guy Fawkes signatures. To our knowledge, our protocol is the first one that solves the unbounded number of message transmission issue in unreliable settings. It does not lose efficiency and introduces only a constant-size overhead in message transmission, compared to solutions assuming a bounded number of message transmissions. We rigorously model the adversarial setting and show that our protocol satisfies the definition, leveraging on standard assumptions. Apart from the technical contribution, along the line, we also point out the relevance of ideas and techniques developed in the past in the area of efficient authentication, in order to provide new authentication schemes, ready for the post-quantum world.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.