IACR News item: 04 February 2014
Joel Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
ePrint ReportIn this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of~\\cite{Mau11}. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called \\emph{key indistinguishable} (KI) MACs. Similar to the key hiding encryption schemes of~\\cite{BellareBDP01} they guarantee that tags leak no discernible information about the keys used to generate them.
Additional news items may be found on the IACR news page.