aggregate message
play

Aggregate Message Authentication Codes with Detecting Functionality - PowerPoint PPT Presentation

IEEE IS IE ISIT IT 20 2020 Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes Yoshinori Ogawa *, Shingo Sato** Junji Shikata*, Hideki Imai*** *Yokohama National University, Japan **NICT, Japan


  1. IEEE IS IE ISIT IT 20 2020 Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes Yoshinori Ogawa *, Shingo Sato** Junji Shikata*, Hideki Imai*** *Yokohama National University, Japan **NICT, Japan ***Japan Datacom Co., Ltd., Japan

  2. Background: What is a problem? ⚫ The number of IoT devices is increasing, and there will be an enormous number of devices connected to networks including 5G in the near future. ⚫ Even in such a situation, it is required to realize efficient communications or data transmissions in an authenticated manner in the network. O ne-to-one authenticated communication by MACs Receiver IoT device 1 Authenticated data 1 Data 1 Tag Verify Generation OK/NG IoT device 2 Total amount Data 2 Authenticated data 2 Tag Verify of transmitted Generation data is large! OK/NG IoT device n Data n Tag Authenticated data n Verify Generation OK/NG "𝐎𝐯𝐧𝐜𝐟𝐬 𝐩𝐠 𝐍𝐁𝐃_𝐮𝐛𝐡" ∝ 𝒐

  3. Aggregate Message Authentication Code (Having Detecting Functionality) ⚫ [KL08] proposed the aggregate message authentication code (AMAC): AMAC can compress MAC tags on multiple messages into a short aggregate-tag. ⚫ [HS18] proposed AMAC with detecting functionality (AMAD): AMAD is an AMAC that can detect an invalid message even if a verification algorithm outputs NG. IoT device 1 Data 1 Authenticated data 1 Receiver Tag Generation IoT device 2 Authenticated data 2 Aggregated data Data 2 Tag Aggregation Verify Generation ★ Total amount of transmitted data is small. OK/NG IoT device n Authenticated data n Data n Tag 3 Generation

  4. Our Purpose and Related Work Proposing construction of practical AMAD from error-correcting codes; The essential point is to reduce the number of rows for disjunct matrices. ◆ [HS18] utilized disjunct matrices for constructing AMAD. ◆ Merit: Construction is very simple. ◆ Demerit: There is theoretical limitation on the number of rows for disjunct matrices, by which we cannot reduce size of tags drastically. ◆ [MK19] designed disjunct matrices from quasi-cyclic LDPC codes using finite geometry. ◆ Merit: The resulting matrix achieved high disjunctness and its description requires less memory by using quasi-cyclic property (i.e., we do not need to store a whole disjunct matrix). ◆ Demerit: Disjunctness 𝑒 = 𝑃( 𝑜) is determined from the number 𝑜 of columns, and there is no solution to reduce the number of rows for smaller 𝑒 . 4

  5. Our Approach and Contribution ⚫ Approach: Suppose that 𝑇 is a generator matrix of a binary error-correcting code having size 𝑙 × 𝑜 . Then, let Σ be a (2 𝑙 − 1) × 𝑜 matrix obtained by arranging all codewords in its rows except the zero-vector. Then, design a matrix 𝑇 such that Σ is an almost disjunct matrix. In particular, we consider a generator matrix 𝑇 of biorthogonal codes. ⚫ Contribution: 1. Analysis of disjunctness for biorthogonal codes 2. Extension of AMAD construction in [HS18] 3. Evaluation on performance of our AMAD construction 5

  6. (Almost) Disjunct Matrices Definition. A 𝑣 × 𝑜 binary matrix 𝐻 is a 𝑒 -disjunct matrix, if for arbitrary 𝑒 + 1 columns selected from the matrix, the resulting 𝑣 × (𝑒 + 1) matrix contains all the unit vectors with length 𝑒 + 1 in its rows. Definition. A 𝑣 × 𝑜 binary matrix 𝐻 is said to be a (𝑒, 𝑞) -almost- disjunct matrix if the following conditions are satisfied: Let 𝑡 be the number of selecting 𝑒 + 1 columns of 𝐻 , {g 𝑗 1 , g 𝑗 2 … , g 𝑗 𝑒+1 } such that the matrix (g 𝑗 1 , g 𝑗 2 … , g 𝑗 𝑒+1 ) contains all the unit vectors with length 𝑒 + 1 in its rows; 𝑜 Then, we define 𝑞 = 𝑡/ 𝑒+1 . Remark. 𝑒 -disjunctness implies (𝑒, 1) -almost-disjunctness. 6

  7. Biorthogonal code and its disjunctness(1/2) Definition. ⚫ Let 𝐷 ℓ be an extended binary Hamming code having length 𝑜 = 2 ℓ , dimension 𝑙 = 2 ℓ − 1 − ℓ , and minimum distance 𝑒 𝑛𝑗𝑜 = 4 . ⊥ be the dual of 𝐷 ℓ , and it is called an ℓ -order ⚫ Let 𝐷 ℓ biorthogonal code . ⊥ has length length 𝑜 = 2 ℓ , dimension 𝑙 = ℓ + 1 , and minimum 𝐷 ℓ distance 𝑒 𝑛𝑗𝑜 = 𝑜/2 = 2 ℓ−1 . More precisely, the code contains all 0s vector, all 1s vector, and 2𝑜 − 2 vectors of weight 𝑜/2 . 7

  8. Biorthogonal code and its disjunctness(2/2) Theorem. Suppose that 𝑇 is a generator matrix of an ℓ -order ⊥ with code length 𝑜 = 2 ℓ . Then, let Σ be a matrix biorthogonal code 𝐷 ℓ obtained from 𝑇 by arranging all codewords in its rows except the zero- vector. Then, (𝑒, 𝑞) -almost-disjunctness of Σ is shown as follows. 𝑞 = 𝑄 𝐺 (𝑒 + 1, 𝑒 + 1, 𝑜) , where 𝑄 𝐺 𝑢, 𝑠, 𝑜 = 𝐺(𝑢, 𝑠, 𝑜)/ 𝑜 and 𝐺(𝑢, 𝑠, 𝑜) is the number of all 𝑢 combinations for choosing 𝑢 columns from 𝑜 columns in 𝑇 such that the rank of 𝑇 is 𝑠 . In addition, 𝐺(𝑢, 𝑠, 𝑜) is computed as follows: 1 𝑠−1 𝑠−1 𝑢 𝐺 𝑢 − 1, 𝑠 − 1, 𝑜 𝑜 − σ 𝑗=1,𝑗:𝑝𝑒𝑒 (1) 𝐺 𝑢, 𝑠, 𝑜 = + 𝑗 1 𝑠 𝑠 𝑢 𝐺 𝑢 − 1, 𝑠, 𝑜 σ 𝑗=1,𝑗:𝑝𝑒𝑒 𝑗 − (𝑢 − 1) if 𝑢 > 𝑠 , 1 𝑗−1 𝑢 𝑗−1 𝑢! ς 𝑗=1 𝑜 − σ 𝑘=1,𝑘:𝑝𝑒𝑒 (2) 𝐺 𝑢, 𝑢, 𝑜 = if 𝑢 ≥ 2 , 𝑘 (3) 𝐺 1,1, 𝑜 = 𝑜. 8

  9. Our Construction of AMAD (1/2) Suppose that: ◆ A MAC function F is given; and ◆ 𝑇 = (𝑇 𝑗,𝑘 ) is a generator matrix of a biorthogonal code having 𝑜, 𝑙, 𝑒 𝑛𝑗𝑜 = 2 ℓ , ℓ + 1, 2 ℓ−1 with ℓ ≥ 3 . ◆ Σ is a matrix whose rows consist of all codewords generated by 𝑇 except for the zero-vector. ◆ 𝐻 is an (ℓ + 1) × 𝑜 matrix with entries in 𝐻𝐺(2 ℎ ) and its 𝑗 -th row 𝐻 𝑗 is given by 𝐻 𝑗 = (𝑇 𝑗,1 , 𝛽𝑇 𝑗,2 , 𝛽 2 𝑇 𝑗,3 , … , 𝛽 𝑜−1 𝑇 𝑗,𝑜 ) , where 𝛽 is a primitive element of 𝐻𝐺(2 ℎ ) . ◆ Γ is a (2 ℓ+1 − 1) × 𝑜 matrix whose rows consist of all codewords generated by 𝐻 except for the zero-vector. Then, AMAD=(KGen, Tag, Agg, TVrfy) is constructed as follows. Key Generation. 𝐿 𝑗𝑒 ← KGen(1 𝜇 , 𝑗𝑒) : ⚫ For each 𝑗𝑒 , generate a random key 𝐿 , and set 𝐿 𝑗𝑒 ≔ (𝑗𝑒, 𝐿) . ⚫ Tagging. 𝑢 ← Tag 𝐿 𝑗𝑒 , 𝑛 : For a pair of an ID and a message (𝑗𝑒, 𝑛) and 𝐿 𝑗𝑒 ≔ (𝑗𝑒, 𝐿) , define 𝑢 ← 𝐺 𝐿, 𝑛 . 9

  10. Our Construction of AMAD (2/2) ⚫ Aggregation. 𝑈 ← Agg 𝑗𝑒 1 , 𝑛 1 , 𝑢 1 , … , 𝑗𝑒 𝑜 , 𝑛 𝑜 , 𝑢 𝑜 : 1 = 𝒖𝑇 𝑈 . For 𝒖 = (𝑢 1 , … , 𝑢 𝑜 ) , it computes 𝑈 ′ ∈ {0,1} ℎ be last ℎ bits of 𝑢 𝑗 , and regard For each 1 ≤ 𝑗 ≤ 𝑜, let 𝑢 𝑗 ′ ∈ 𝐻𝐺(2 ℎ ) . Set 𝒖′ = 𝑢 1 ′, … , 𝑢 𝑜 ′ . It computes 𝑈 2 = 𝒖′𝐻 𝑈 . Then, output 𝑈 ≔ 𝑈 𝑢 𝑗 1 , 𝑈 2 . ⚫ Verification. 𝐾 ← TVrfy( 𝐿 1 , … , 𝐿 𝑜 , 𝑗𝑒 1 , 𝑛 1 , … , 𝑗𝑒 𝑜 , 𝑛 𝑜 , 𝑈) For each 1 ≤ 𝑗 ≤ 𝑜 , compute 𝑢 𝑗 ← Tag 𝐿 𝑗𝑒 𝑗 , 𝑛 , and set 𝒖 = (𝑢 1 , … , 𝑢 𝑜 ) . It computes 𝒕 = 1 − 𝒖𝑇 𝑈 . If 𝒕 = 0 , output 𝐾 ≔ ∅ ; Otherwise, do the following. 𝑈 1) 𝐸 ← 1,2, … , 𝑜 , 𝑀 ← 1,2, … , 2 ℓ+1 − 1 . 2) By using 𝒕 and Σ , compute 𝜏 = 𝒇 Σ 𝑈 , where 𝒇 is an error-vector such that 𝒕 = 𝒇 𝑇 𝑈 . 3) For 1 ≤ 𝑗 ≤ 2 ℓ+1 − 1 , do the following: If 𝜏 𝑗 = 0 , set 𝐸 ← 𝐸 ∖ {𝑘 𝑗,1 , … , 𝑘 𝑗,𝑥 𝑗 } , and 𝑀 ← 𝑀 ∖ {𝑗} , where 𝑘 𝑗,1 , … , 𝑘 𝑗,𝑥 𝑗 are integers such that Σ 𝑗,𝑘 𝑗,1 = ⋯ = Σ 𝑗,𝑘 𝑗,𝑥𝑗 = 1 in the 𝑗 -th row of Σ . 4) compute 𝒖′ as in the aggregation process. Compute 𝒉 = 𝑈 2 − 𝒖′𝐻 𝑈 = 𝑓 ′ 𝐻 𝑈 . By using 𝒉 and Γ , compute 𝛿 = 𝑓 ′ Γ 𝑈 ′ ∈ {0,1} ℎ be last ℎ bits of 𝜏 𝑗 , and regard 5) For each each 1 ≤ 𝑗 ≤ 2 ℓ+1 − 1 , let let 𝜏 𝑗 ′ ∈ 𝐻𝐺(2 ℎ ) . Compute 𝐸 ′ = 𝑘 Σ 𝑗,𝑘 𝛽 𝑘−1 𝜏 𝑗 ′ = 𝛿 𝑗 for 𝑗 ∈ 𝑀 and 𝑘 ∈ 𝐸} . 𝜏 𝑗 6) Output a list 𝐾 consisting of all 𝑗𝑒 𝑘 with 𝑘 ∈ 𝐸 ′ . 10

  11. LB on detecting probability of our AMAD Theorem. For an integer 1 ≤ 𝑒 ≤ ℓ , the lower bound of detecting probability 𝑄(ℓ, 𝑒) in our AMAD construction is given by 𝑄 ℓ, 𝑒 ≥ 𝑄 𝐺 𝑒, 𝑒, 𝑜 + 𝑄 𝐻 (𝑒, 𝑜) , where the function 𝑄 𝐺 is defined by 𝑄 𝐺 𝑢, 𝑠, 𝑜 = 𝐺(𝑢, 𝑠, 𝑜)/ 𝑜 𝑢 , 𝑄 𝐻 𝑢, 𝑜 ≔ 𝐻(𝑢, 𝑜)/ 𝑜 𝑢 , and 𝐻(𝑢, 𝑜) meets the following relationships: 1 𝑢−1 (1) 𝐻 𝑢, 𝑜 = 𝑢 𝐺 𝑢 − 1, 𝑢 − 1, 𝑜 × + 3 1 𝑢−2 𝑢−2 𝑜 − σ 𝑗=1,𝑗:𝑝𝑒𝑒 𝑢 𝐻 𝑢 − 1, 𝑜 if 𝑢 ≥ 5 , 𝑗 1 (2) 𝐻 4, 𝑜 = 4 𝐺 3,3, 𝑜 . 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend