Abstract

Hazay et al. initiated the formal study of leakage-resilient message authentication code (MAC) and presented a MAC scheme that is both leakage resilient and unforgeable against chosen message and no verification query attack (uf-cm-nvq). As the communication overhead of their construction is linear with the parameters that control the leakage bound, their scheme sacrifices efficiency in exchange for leakage resilience. In this study, the authors study the problem of designing leakage-resilient MACs in the public-key setting with acceptable communication efficiency. In particular, a notion called ‘hidden identity weak hash proof system’(HID-wHPS) is introduced. Then a generic MAC construction is presented under the abstraction framework of HID-wHPS. Security properties guaranteed by HID-wHPS enable us to prove the author's construction to be both leakage resilient and uf-cm-nvq in a modular way. Finally, performance analysis shows that their MAC construction yields improved tagging-key size, tag size as well as computation overhead under the given leakage bound.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call