Multipath Authentication without shared Secrets and with Applications in Quantum Networks

Authentication is possible in various ways, the most obvious of which is by re-calculating a given authentication tag upon a private secret shared only with the message’s origin. What, however, if no such shared secrets are available? Public-key cryptography has elegantly solved the problem by relying on computational intractability assumptions. In the light of increasing computational power, can we achieve the same thing in the secret-key paradigm? In a quantum network, we may have shared secrets between adjacent nodes, making an authentic communication between these simple, but what about end-to-end authentication? We present a simple method of authenticating a transmission that requires shared secrets only between neighboring nodes in a (quantum) network, but the sender and receiver (being farther apart) do not need to share any secret knowledge. Our approach is inspired by multipath transmission and thus naturally compatible with this paradigm. The security of the proposed method is analyzed based on decision-theoretic considerations, and therefore does not hinge on any computational intractability assumption.

[1]  Peter Schartner,et al.  Game-Theoretic Security Analysis of Quantum Networks , 2009, 2009 Third International Conference on Quantum, Nano and Micro Technologies.

[2]  Panayiotis Kotzanikolaou,et al.  Secure Multipath Routing for Mobile Ad Hoc Networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.

[3]  J. Bierbrauer Authentication Via Algebraic-Geometric Codes , 1997 .

[4]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[5]  Stefan Rass On Information-Theoretic Security - Contemporary Problems and Solutions , 2009 .

[6]  Dharma P. Agrawal,et al.  Secure interconnection protocol for integrated Internet and ad hoc networks , 2008, Wirel. Commun. Mob. Comput..

[7]  Victor Shoup,et al.  On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.

[8]  Adrian Perrig,et al.  Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.

[9]  Yu-Kwong Kwok,et al.  A new multipath routing approach to enhancing TCP security in ad hoc wireless networks , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).

[10]  G. Gilbert,et al.  Practical Quantum Cryptography: A Comprehensive Analysis (Part One) , 2000, quant-ph/0009027.

[11]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[12]  Yuguang Fang,et al.  SPREAD: Improving network security by multipath routing in mobile ad hoc networks , 2007, Wirel. Networks.

[13]  Renato Renner,et al.  Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret , 2003, CRYPTO.

[14]  Angelos D. Keromytis,et al.  DoubleCheck: Multi-path verification against man-in-the-middle attacks , 2009, 2009 IEEE Symposium on Computers and Communications.

[15]  Douglas R. Stinson Universal Hashing and Authentication Codes , 1991, CRYPTO.