Message Authentication Codes with Error Correcting Capabilities View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2002-12-16

AUTHORS

Charles C. Y. Lam , Guang Gong , Scott A. Vanstone

ABSTRACT

In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures. More... »

PAGES

354-366

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30

DOI

http://dx.doi.org/10.1007/3-540-36159-6_30

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020441167


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lam", 
        "givenName": "Charles C. Y.", 
        "id": "sg:person.012436040744.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012436040744.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gong", 
        "givenName": "Guang", 
        "id": "sg:person.014435421415.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435421415.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vanstone", 
        "givenName": "Scott A.", 
        "id": "sg:person.010344544767.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2002-12-16", 
    "datePublishedReg": "2002-12-16", 
    "description": "In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures.", 
    "editor": [
      {
        "familyName": "Deng", 
        "givenName": "Robert", 
        "type": "Person"
      }, 
      {
        "familyName": "Bao", 
        "givenName": "Feng", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhou", 
        "givenName": "Jianying", 
        "type": "Person"
      }, 
      {
        "familyName": "Qing", 
        "givenName": "Sihan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-36159-6_30", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-00164-5", 
        "978-3-540-36159-6"
      ], 
      "name": "Information and Communications Security", 
      "type": "Book"
    }, 
    "keywords": [
      "message authentication code", 
      "authentication codes", 
      "hash function", 
      "keyed hash function", 
      "linear feedback shift register structure", 
      "error correcting capabilities", 
      "error recovery", 
      "wireless communication", 
      "new notion", 
      "code", 
      "register structure", 
      "capability", 
      "hardware", 
      "forgery", 
      "applications", 
      "messages", 
      "error", 
      "communication", 
      "class", 
      "transmission", 
      "notion", 
      "function", 
      "means", 
      "typical phenomenon", 
      "structure", 
      "phenomenon", 
      "recovery", 
      "paper"
    ], 
    "name": "Message Authentication Codes with Error Correcting Capabilities", 
    "pagination": "354-366", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020441167"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-36159-6_30"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-36159-6_30", 
      "https://app.dimensions.ai/details/publication/pub.1020441167"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:52", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_103.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-36159-6_30"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-36159-6_30'


 

This table displays all metadata directly associated to this object as RDF triples.

118 TRIPLES      22 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-36159-6_30 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N992d06c9a75c4e73959a1ca66a0b0d83
4 schema:datePublished 2002-12-16
5 schema:datePublishedReg 2002-12-16
6 schema:description In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new notion of error tolerant forgery of hash messages. These MACs allow full error recovery for all applications, while being error-tolerant for less information-sensitive applications. The classes of the keyed hash functions are highly secure, and provide the capabilities of correcting errors on transmission, including burst-errors, which is a typical phenomenon in wireless communications. These classes of hash functions are easily implementable in hardware by means of simple linear feedback shift register structures.
7 schema:editor N1810fd159a84471dbf5fe3e9854cb920
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Ne27ee4e49e6341dcb9c19e46b015dd31
11 schema:keywords applications
12 authentication codes
13 capability
14 class
15 code
16 communication
17 error
18 error correcting capabilities
19 error recovery
20 forgery
21 function
22 hardware
23 hash function
24 keyed hash function
25 linear feedback shift register structure
26 means
27 message authentication code
28 messages
29 new notion
30 notion
31 paper
32 phenomenon
33 recovery
34 register structure
35 structure
36 transmission
37 typical phenomenon
38 wireless communication
39 schema:name Message Authentication Codes with Error Correcting Capabilities
40 schema:pagination 354-366
41 schema:productId N29f3b697b0f04ee6bd0804f37c192efc
42 Nb6b8314cff3948a7b0dbe1b0334e07a6
43 schema:publisher N96cad49495a543ff9346b32a198ca886
44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020441167
45 https://doi.org/10.1007/3-540-36159-6_30
46 schema:sdDatePublished 2022-10-01T06:52
47 schema:sdLicense https://scigraph.springernature.com/explorer/license/
48 schema:sdPublisher N0045ea4494ef4d72b5f84e814f07b52f
49 schema:url https://doi.org/10.1007/3-540-36159-6_30
50 sgo:license sg:explorer/license/
51 sgo:sdDataset chapters
52 rdf:type schema:Chapter
53 N0045ea4494ef4d72b5f84e814f07b52f schema:name Springer Nature - SN SciGraph project
54 rdf:type schema:Organization
55 N1810fd159a84471dbf5fe3e9854cb920 rdf:first N2fd91bdd9848423b9cf0053e0016b122
56 rdf:rest N2394f820c19d4508ab66b3f9900e4d8f
57 N19372ecb967c46808e4b4f96fe5ab41c schema:familyName Zhou
58 schema:givenName Jianying
59 rdf:type schema:Person
60 N2394f820c19d4508ab66b3f9900e4d8f rdf:first Nc1c89181980846709bca21731f27dee0
61 rdf:rest Nec12e4c8351844138129b238e8f6ab58
62 N27df932692e8478c82b881cf08d753c8 rdf:first sg:person.010344544767.07
63 rdf:rest rdf:nil
64 N29f3b697b0f04ee6bd0804f37c192efc schema:name doi
65 schema:value 10.1007/3-540-36159-6_30
66 rdf:type schema:PropertyValue
67 N2fd91bdd9848423b9cf0053e0016b122 schema:familyName Deng
68 schema:givenName Robert
69 rdf:type schema:Person
70 N5acd7176bc82463abde40348edd3e55d rdf:first N81a9ec8ded864c94b7aa036ae8251a73
71 rdf:rest rdf:nil
72 N81a9ec8ded864c94b7aa036ae8251a73 schema:familyName Qing
73 schema:givenName Sihan
74 rdf:type schema:Person
75 N96cad49495a543ff9346b32a198ca886 schema:name Springer Nature
76 rdf:type schema:Organisation
77 N992d06c9a75c4e73959a1ca66a0b0d83 rdf:first sg:person.012436040744.03
78 rdf:rest Ndcf575869db44ad68f95921e07585cfa
79 Nb6b8314cff3948a7b0dbe1b0334e07a6 schema:name dimensions_id
80 schema:value pub.1020441167
81 rdf:type schema:PropertyValue
82 Nc1c89181980846709bca21731f27dee0 schema:familyName Bao
83 schema:givenName Feng
84 rdf:type schema:Person
85 Ndcf575869db44ad68f95921e07585cfa rdf:first sg:person.014435421415.03
86 rdf:rest N27df932692e8478c82b881cf08d753c8
87 Ne27ee4e49e6341dcb9c19e46b015dd31 schema:isbn 978-3-540-00164-5
88 978-3-540-36159-6
89 schema:name Information and Communications Security
90 rdf:type schema:Book
91 Nec12e4c8351844138129b238e8f6ab58 rdf:first N19372ecb967c46808e4b4f96fe5ab41c
92 rdf:rest N5acd7176bc82463abde40348edd3e55d
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
97 schema:name Data Format
98 rdf:type schema:DefinedTerm
99 sg:person.010344544767.07 schema:affiliation grid-institutes:grid.46078.3d
100 schema:familyName Vanstone
101 schema:givenName Scott A.
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07
103 rdf:type schema:Person
104 sg:person.012436040744.03 schema:affiliation grid-institutes:grid.46078.3d
105 schema:familyName Lam
106 schema:givenName Charles C. Y.
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012436040744.03
108 rdf:type schema:Person
109 sg:person.014435421415.03 schema:affiliation grid-institutes:grid.46078.3d
110 schema:familyName Gong
111 schema:givenName Guang
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014435421415.03
113 rdf:type schema:Person
114 grid-institutes:grid.46078.3d schema:alternateName Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
115 Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
116 schema:name Department of Combinatorics & Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
117 Department of Electrical and Computer Engineering, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
118 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...