Please use this identifier to cite or link to this item:
|Title:||On the (Im)possibility of aggregate Message Authentication Codes|
|Authors:||Chan, A.C-F. |
|Citation:||Chan, A.C-F., Castelluccia, C. (2008). On the (Im)possibility of aggregate Message Authentication Codes. IEEE International Symposium on Information Theory - Proceedings : 235-239. ScholarBank@NUS Repository. https://doi.org/10.1109/ISIT.2008.4594983|
|Abstract:||In data aggregation, multiple source nodes send their data to a sink along a concast tree with aggregation done en route so that the sink can obtain the aggregate (which could be the sum, average, etc.) of all these data. End-to-end privacy and aggregate integrity are the two main goals of secure data aggregation. While the privacy goal has been widely studied, providing end-to-end aggregate integrity in the presence of possibly compromised aggregating nodes remains largely an open problem. Message Authentication Codes (MAC) are commonly used to provide end-to-end data integrity in two party settings. Natural extensions of MAC for the data aggregation scenario are considered. It is shown that a straightforward and intuitive refinement of the MAC security model (for the data aggregation setting) is not achievable. A weaker security notion is proposed; whether this notion is achievable remains unclear. © 2008 IEEE.|
|Source Title:||IEEE International Symposium on Information Theory - Proceedings|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Aug 11, 2018
WEB OF SCIENCETM
checked on Jul 17, 2018
checked on Apr 21, 2018
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.