Authentication of fragments with short tags
We present a scheme that uses short tags to protect the integrity of fragmented messages transmitted from a sender to a receiver, and analyse the communication and computation overheads of the scheme. The security of this integrity-protection scheme is based on three new theoretical cryptographic re...
Saved in:
Published in | Theoretical computer science Vol. 1009; p. 114643 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
12.09.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | We present a scheme that uses short tags to protect the integrity of fragmented messages transmitted from a sender to a receiver, and analyse the communication and computation overheads of the scheme. The security of this integrity-protection scheme is based on three new theoretical cryptographic results that could be interesting in their own right.
•Authentication for fragmented messages, where short tag is attached to each fragment.•Enables discarding invalid fragments early.•Acquiring strong integrity properties cumulatively as more fragments are received.•Cryptographic security proofs. |
---|---|
ISSN: | 0304-3975 1879-2294 |
DOI: | 10.1016/j.tcs.2024.114643 |