A note on lower bounds for non-interactive message authentication using weak keys

In this note, we prove lower bounds on the amount of entropy of random sources necessary for secure message authentication. We consider the problem of non-interactive c-time message authentication using a weak secret key having min-entropy k. We show that existing constructions using (c+1)-wise independent hash functions are optimal. This result resolves one of the main questions left open by the work of Dodis and Spencer [1] who considered this problem for one-time message authentication of one-bit messages.

[1]  T. Helleseth,et al.  Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.

[2]  Douglas R. Stinson Universal Hashing and Authentication Codes , 1991, CRYPTO.

[3]  Yevgeniy Dodis,et al.  Does Privacy Require True Randomness? , 2007, TCC.

[4]  Serge Fehr,et al.  On the Conditional Rényi Entropy , 2014, IEEE Transactions on Information Theory.

[5]  Joel H. Spencer,et al.  On the (non)universality of the one-time pad , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..