Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ISIT.2008.4594983
Title: | On the (Im)possibility of aggregate Message Authentication Codes | Authors: | Chan, A.C-F. Castelluccia, C. |
Issue Date: | 2008 | Citation: | Chan, A.C-F., Castelluccia, C. (2008). On the (Im)possibility of aggregate Message Authentication Codes. IEEE International Symposium on Information Theory - Proceedings : 235-239. ScholarBank@NUS Repository. https://doi.org/10.1109/ISIT.2008.4594983 | Abstract: | In data aggregation, multiple source nodes send their data to a sink along a concast tree with aggregation done en route so that the sink can obtain the aggregate (which could be the sum, average, etc.) of all these data. End-to-end privacy and aggregate integrity are the two main goals of secure data aggregation. While the privacy goal has been widely studied, providing end-to-end aggregate integrity in the presence of possibly compromised aggregating nodes remains largely an open problem. Message Authentication Codes (MAC) are commonly used to provide end-to-end data integrity in two party settings. Natural extensions of MAC for the data aggregation scenario are considered. It is shown that a straightforward and intuitive refinement of the MAC security model (for the data aggregation setting) is not achievable. A weaker security notion is proposed; whether this notion is achievable remains unclear. © 2008 IEEE. | Source Title: | IEEE International Symposium on Information Theory - Proceedings | URI: | http://scholarbank.nus.edu.sg/handle/10635/40367 | ISBN: | 9781424422579 | DOI: | 10.1109/ISIT.2008.4594983 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.