Please use this identifier to cite or link to this item: https://doi.org/10.1109/ISIT.2008.4594983
Title: On the (Im)possibility of aggregate Message Authentication Codes
Authors: Chan, A.C-F. 
Castelluccia, C.
Issue Date: 2008
Source: Chan, A.C-F., Castelluccia, C. (2008). On the (Im)possibility of aggregate Message Authentication Codes. IEEE International Symposium on Information Theory - Proceedings : 235-239. ScholarBank@NUS Repository. https://doi.org/10.1109/ISIT.2008.4594983
Abstract: In data aggregation, multiple source nodes send their data to a sink along a concast tree with aggregation done en route so that the sink can obtain the aggregate (which could be the sum, average, etc.) of all these data. End-to-end privacy and aggregate integrity are the two main goals of secure data aggregation. While the privacy goal has been widely studied, providing end-to-end aggregate integrity in the presence of possibly compromised aggregating nodes remains largely an open problem. Message Authentication Codes (MAC) are commonly used to provide end-to-end data integrity in two party settings. Natural extensions of MAC for the data aggregation scenario are considered. It is shown that a straightforward and intuitive refinement of the MAC security model (for the data aggregation setting) is not achievable. A weaker security notion is proposed; whether this notion is achievable remains unclear. © 2008 IEEE.
Source Title: IEEE International Symposium on Information Theory - Proceedings
URI: http://scholarbank.nus.edu.sg/handle/10635/40367
ISBN: 9781424422579
DOI: 10.1109/ISIT.2008.4594983
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

SCOPUSTM   
Citations

13
checked on Dec 6, 2017

WEB OF SCIENCETM
Citations

6
checked on Nov 20, 2017

Page view(s)

37
checked on Dec 10, 2017

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.