{"title":"Revisiting Aggregation Sequentially with M-A-C’s and Detecting Functionality","authors":"Ritu Shree, Manjeet","doi":"10.1109/IC3I56241.2022.10073247","DOIUrl":null,"url":null,"abstract":"A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I56241.2022.10073247","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.