1981
DOI: 10.1016/0022-0000(81)90033-7
|View full text |Cite
|
Sign up to set email alerts
|

New hash functions and their use in authentication and set equality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
697
0
4

Year Published

1999
1999
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,056 publications
(721 citation statements)
references
References 7 publications
0
697
0
4
Order By: Relevance
“…As pointed out by Naor and Yung [NY89], we can get composite schemes with logarithmic key size by using a tree hash, which is the same as a construction proposed by Wegman and Carter [WC81] for composing universal hash functions. For simplicity, assume that a = bd for an integer d, and that we want to hash messages of length bd t for some t > 0.…”
Section: Previous Composition Constructionsmentioning
confidence: 94%
“…As pointed out by Naor and Yung [NY89], we can get composite schemes with logarithmic key size by using a tree hash, which is the same as a construction proposed by Wegman and Carter [WC81] for composing universal hash functions. For simplicity, assume that a = bd for an integer d, and that we want to hash messages of length bd t for some t > 0.…”
Section: Previous Composition Constructionsmentioning
confidence: 94%
“…In addition to secrecy, we also need to ensure authenticity of the communication between the components. We observe that this can be done easily using information-theoretic MAC schemes based on universalhashing [33,3]. Roughly, each pair of components will maintain rolling MAC keys that are only used Θ(1) times.…”
Section: From Ocl + To Ldsmentioning
confidence: 99%
“…We therefore show how to realize secure communication channels over insecure networks in a leakage-resilient manner. This construction, which uses noncommitting encryption [12] and information theoretic MACs (e.g., [33,3]), is the main technical novelty in the current work. See Section 1.4.…”
Section: Introductionmentioning
confidence: 99%
“…For each set of parameters, 1000 trials were run, with a new graph and new random choice of (non-compromised and non-adjacent) Alice and Bob for each trial. The number of paths was chosen according to equation (6) and the number of edges according to equation (3), with δ = 0.01 used as the target probability of compromise. The variation of these parameters with changes in t and N is shown in figure 3.…”
Section: Simulation Resultsmentioning
confidence: 99%