Please use this identifier to cite or link to this item:
Title: On the (Im)possibility of aggregate Message Authentication Codes
Authors: Chan, A.C-F. 
Castelluccia, C.
Issue Date: 2008
Citation: Chan, A.C-F., Castelluccia, C. (2008). On the (Im)possibility of aggregate Message Authentication Codes. IEEE International Symposium on Information Theory - Proceedings : 235-239. ScholarBank@NUS Repository.
Abstract: In data aggregation, multiple source nodes send their data to a sink along a concast tree with aggregation done en route so that the sink can obtain the aggregate (which could be the sum, average, etc.) of all these data. End-to-end privacy and aggregate integrity are the two main goals of secure data aggregation. While the privacy goal has been widely studied, providing end-to-end aggregate integrity in the presence of possibly compromised aggregating nodes remains largely an open problem. Message Authentication Codes (MAC) are commonly used to provide end-to-end data integrity in two party settings. Natural extensions of MAC for the data aggregation scenario are considered. It is shown that a straightforward and intuitive refinement of the MAC security model (for the data aggregation setting) is not achievable. A weaker security notion is proposed; whether this notion is achievable remains unclear. © 2008 IEEE.
Source Title: IEEE International Symposium on Information Theory - Proceedings
ISBN: 9781424422579
DOI: 10.1109/ISIT.2008.4594983
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on Aug 11, 2018


checked on Jul 17, 2018

Page view(s)

checked on Apr 21, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.