## Meeting Abstracts (1995)

Venue: | 2004, Proc. SPIE |

Citations: | 1 - 0 self |

### BibTeX

@INPROCEEDINGS{Katz95meetingabstracts,

author = {Jonathan Katz and Yehuda Lindell},

title = {Meeting Abstracts},

booktitle = {2004, Proc. SPIE},

year = {1995}

}

### OpenURL

### Abstract

We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for authenticated communication in mobile ad-hoc networks or other settings where resource-constrained devices share distinct keys with a single entity (such as a base station), and communication is an expensive resource. 1

### Citations

1678 |
The fractal geometry of nature
- Mandelbrot
- 1983
(Show Context)
Citation Context ...ntroduction A system with a self-similar property exhibits a statistically similar characteristic when examined at the level of individual entities, collections of entities or the system as a whole Ž =-=Mandelbrot, 1983-=- . . In other words the same general characteristic can be seen locally and globally and thus it is independent of the scale at which the observation is made. Fur) E-mail: j.s.katz@sussex.ac.uk 1 This... |

833 | A Digital Signature Scheme Secure Against Adaptive Chosen Message Attacks
- Goldwasser, Micali, et al.
- 1988
(Show Context)
Citation Context ... footnote 2, we do assume (mi, idi) �= (mj, idj).) As in the case of aggregate signatures, our definition of security corresponds to existential unforgeability under an adaptive chosen-message attack =-=[8]-=-. Because we are in the shared-key setting, however, there are some technical differences between our definition and the security definition for aggregate signatures. In particular, we consider an adv... |

618 | Communication complexity
- Kushilevitz, Nisan
- 1997
(Show Context)
Citation Context ...ols with error at most ɛ. It is known that there exist functions f : {0, 1} ℓ × {0, 1} ℓ → {0, 1} for which CCɛ(f) = Ω(ℓ); the inner-product function IP (x, y) = �ℓ i=1 xiyi mod 2 is one example. See =-=[10, 15]-=- for more on communication complexity. Let (Mac ∗ , Agg ∗ , Vrfy ∗ ) be an aggregate MAC scheme in which verification of any message can be carried out in time O(log ℓ). At the very least, this implie... |

237 | Aggregate and verifiably encrypted signatures from bilinear maps
- Boneh, Gentry, et al.
- 2003
(Show Context)
Citation Context ...urce-constrained devices share distinct keys with a single entity (such as a base station), and communication is an expensive resource. 1 Introduction Aggregate signatures, introduced by Boneh et al. =-=[5, 16]-=-, allow t distinct signatures by t (possibly different) signers on t (possibly different) messages to be aggregated into a shorter signature that still suffices to convince a verifier that each signer... |

203 |
Self-organised criticality
- Bak, Tang, et al.
- 1988
(Show Context)
Citation Context ...nsion and it is said to have a fractal dimension of 1.28. A power law is one of the common signatures of a nonlinear dynamical process, i.e., a chaotic process, which is at a point of self-organised Ž=-=Bak, 1991-=-. criticality or residing on the boundary between order and disorder. Such a system is often called a self-organised system Ž Gellman, 1994. because it exhibits structure not merely in response to inp... |

126 | The Sociology of Science: Theoretical and Empirical Investigations - Merton - 1973 |

122 | XOR MAC’s: New methods for message authentication using finite pseudorandom functions
- Bellare, Guerin, et al.
- 1995
(Show Context)
Citation Context ...ized MACs (and, in particular, MACs where messages have more than one valid tag for a given key), however, verification cannot be done this way. This means that certain randomized MACs (e.g., XOR-MAC =-=[2]-=-) cannot be utilized directly in the above construction, although we remark that any randomized MAC could be “derandomized” using a pseudorandom function. In any case, most commonly-used MACs are dete... |

119 | Secure aggregation for wireless networks
- Hu, Evans
(Show Context)
Citation Context ...+ 160t ≈ 5.7 × 10 6 bits; this is roughly an order of magnitude improvement in each case. Aggregate MACs could also be used to improve the communication complexity in schemes such as those of [14] or =-=[9]-=- which deal with aggregation of data. We do not explore this further here, as we view the use of such techniques as tangential to the main thrust of this paper. 1.1 Our Contributions Motivated in part... |

112 |
The Self-Organizing
- Krugman
- 1996
(Show Context)
Citation Context ... called a self-organised system Ž Gellman, 1994. because it exhibits structure not merely in response to inputs from the outside but also, indeed primarily, in response to its own internal processes Ž=-=Krugman, 1996-=- . . Finally, a power law is indicative of the existence of a scale-independent or self-similar ŽMandelbrot, 1983. property. A self-similar property is, statistically speaking, a property that is simi... |

90 |
The Matthew Effect in Science
- Merton
- 1968
(Show Context)
Citation Context ...erved. Ž . PII: S0048-7333 99 00010-4 thermore, the scale-independent nature of a self-similar property is characterised by a power-law distribution. We will show that the Matthew effect in science Ž =-=Merton, 1968-=-; Merton, 1988. and other structural features of the science system are self-similar from the level of a sectoral, domestic, and regional science system through to the level of the world science syste... |

70 |
Secure hierarchical in-network aggregation in sensor networks
- Chan, Perrig, et al.
(Show Context)
Citation Context ...ch of concatenating individual tags is optimal up to a multiplicative factor in the security parameter). Related work. Subsequent to our work on this paper, we became aware of two other recent papers =-=[7, 3]-=- that, inter alia, use what are essentially aggregate MACs (and, in fact, use essentially the same construction we show in Section 3). The key additional contributions of our work are: (1) we provide ... |

49 | Sequential Aggregate Signatures from Trapdoor Permutations
- Lysyanskaya, Micali, et al.
(Show Context)
Citation Context ...shorter signature that still suffices to convince a verifier that each signer did indeed sign the appropriate message. Since their introduction, various aggregate signature schemes have been proposed =-=[12, 11, 6, 13, 4]-=-. To the best of our knowledge, however, no formal attention has yet been dedicated to the private-key analogue of aggregate signatures: aggregate message authentication codes (MACs). In this paper, w... |

46 | Evaluative Bibliometrics: The Use of Publication and Citation Analysis - Narin - 1976 |

35 | Sequential aggregate signatures and multisignatures without random oracles
- Lu, Ostrovsky, et al.
- 2006
(Show Context)
Citation Context ...shorter signature that still suffices to convince a verifier that each signer did indeed sign the appropriate message. Since their introduction, various aggregate signature schemes have been proposed =-=[12, 11, 6, 13, 4]-=-. To the best of our knowledge, however, no formal attention has yet been dedicated to the private-key analogue of aggregate signatures: aggregate message authentication codes (MACs). In this paper, w... |

35 | Cours d’ Economie Politique - Pareto |

25 |
The relationship between publicly funded basic research and economic performance. Sussex: Science Policy Research Unit for HM Treasury
- Martin, Salter
- 1996
(Show Context)
Citation Context ...a social activity that affects society. While there may be some debate about the magnitude of the scientific community’s economic contribution to society there is no question that it is significant Ž =-=Martin and Salter, 1996-=- . . In this paper, the science system will be used as an example of a social system. As mentioned earlier, there are some excellent sources of high-quality data about scientific publishing and citati... |

23 |
Ordered multisignatures and identitybased sequential aggregate signatures, with applications to secure routing
- Boldyreva, Gentry, et al.
(Show Context)
Citation Context ...shorter signature that still suffices to convince a verifier that each signer did indeed sign the appropriate message. Since their introduction, various aggregate signature schemes have been proposed =-=[12, 11, 6, 13, 4]-=-. To the best of our knowledge, however, no formal attention has yet been dedicated to the private-key analogue of aggregate signatures: aggregate message authentication codes (MACs). In this paper, w... |

21 | A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Cryptology ePrint Archive
- Bellare, Goldreich, et al.
(Show Context)
Citation Context ...ime adversaries A, the probability that A succeeds in the above experiment is negligible. We do not consider verification queries even though, in general, they may give the adversary additional power =-=[1]-=-. This is justified by the fact that our eventual construction satisfies the conditions stated in [1] for which verification queries do not give any additional power. (Of course, they prove this only ... |

14 |
Does God Play Dice
- Stewart
- 1990
(Show Context)
Citation Context ...as the general form of a linear relationship. The slope of the linear log–log line is simply the exponent of the power law and it is frequently called the Hausdorff–Besicovitch or fractal dimension Ž =-=Stewart, 1989-=- . . Simply speaking an object with, for example, a Hausdorff–Besicovitch dimension of 1.28 has a power-law characteristic that resides in a dimension larger than 1.0 Ž such as a line. but lower than ... |

12 |
Identity-based aggregate signatures
- Gentry, Ramzan
(Show Context)
Citation Context |

11 |
Chaos and Order in the Capital Markets: a New View of Cycles, Prices and Volatility, 2nd Edition
- Peters
- 1996
(Show Context)
Citation Context ...nce Ž or standard deviation . . While a scale-independent distribution like a power-law distribution may have a mean, it can be unstable over time ands4 its variance is usually undefined or infinite Ž=-=Peters, 1991-=-; Shlesinger et al., 1993 . . A power-law distribution is normally characterised by its exponent and the standard error of the exponent. The jaggedness of a coastline is an example of a self-similar p... |

10 |
The Significant Scientific Literature Appears
- Garfield
- 1996
(Show Context)
Citation Context ...ntage of the significant contributions to all of science. In other words, what Bradford postulated for a single discipline, Garfield postulated fors506 science as a whole. A recent citation analysis Ž=-=Garfield, 1996-=-. has shown that as few as 150 journals account for one half of the most frequently cited papers and one quarter of all published scientific papers in the SCI. In other words, Garfield speculates that... |

9 |
Aggregate designated verifier signatures and application to secure routing
- Bhaskar, Herranz, et al.
- 2007
(Show Context)
Citation Context ...ch of concatenating individual tags is optimal up to a multiplicative factor in the security parameter). Related work. Subsequent to our work on this paper, we became aware of two other recent papers =-=[7, 3]-=- that, inter alia, use what are essentially aggregate MACs (and, in fact, use essentially the same construction we show in Section 3). The key additional contributions of our work are: (1) we provide ... |

8 | New paradigms in signature schemes
- Shacham
(Show Context)
Citation Context ...urce-constrained devices share distinct keys with a single entity (such as a base station), and communication is an expensive resource. 1 Introduction Aggregate signatures, introduced by Boneh et al. =-=[5, 16]-=-, allow t distinct signatures by t (possibly different) signers on t (possibly different) messages to be aggregated into a shorter signature that still suffices to convince a verifier that each signer... |

7 |
The Mystery of the Transposed Journal Lists - Wherein Bradford's Law of Scattering is Generalized according to Garfield's Law of Concentration
- Garfield
- 1971
(Show Context)
Citation Context ...d on Bradford’s law of scattering Ž Bradford, 1950 . . Bradford did not have a mathematical equation to support his law and it took a while for information scientists to formulate one ŽNaranan, 1970; =-=Garfield, 1971-=- . . In general, the Bradford distribution of scientific articles in journals for a given subject can be expressed in the functional form J p Apyg Ž . where JŽ p. is the number of journals containing ... |

6 |
Compact sequential aggregate signatures
- Mu, Susilo, et al.
(Show Context)
Citation Context |

6 | Inequality and scientific productivity - Allison - 1980 |

6 |
Stationary scientometric distributions. 1: Different Approximations
- Haitun
- 1982
(Show Context)
Citation Context ...unt decreased as a power of the income. Many investigators have empirically confirmed these and other power-law distributions enhancing their status as candidates for consideration as ‘social laws’ Ž =-=Haitun, 1982-=-a,b,c . . In two general ways, these potential ‘social power laws’ differ from classical physical power laws such as the gravitational force between two masses which varies as the inverse square of th... |

4 |
The Quark and the Jaguar
- Gell-Man
- 1994
(Show Context)
Citation Context ... i.e., a chaotic process, which is at a point of self-organised ŽBak, 1991. criticality or residing on the boundary between order and disorder. Such a system is often called a self-organised system Ž =-=Gellman, 1994-=-. because it exhibits structure not merely in response to inputs from the outside but also, indeed primarily, in response to its own internal processes ŽKrugman, 1996 . . Finally, a power law is indic... |

4 |
The changing shape of British industrial research
- Hicks, Katz
- 1997
(Show Context)
Citation Context ...tals, research council laboratories and government agencies. This can be confirmed by examining institutional participation in refereed UK research papers indexed in the 1994 Science Citation Index Ž =-=Hicks and Katz, 1996-=- . . Of the more than 43,000 publications university, hospital and research council researchers participated in 65%, 27% and 10%, respectively, of these publications. On the other hand, although signi... |

3 |
Relationship between growth in gross domestic product (GDP) and growth in the chemical engineering literature in five different countries
- Hart, Sommerfeld
- 1998
(Show Context)
Citation Context ...n measures to overcome the internal dynamics and momentum in the system. For example, there is evidence to show that the relationship between national funding and the publishing size of a community Ž =-=Hart and Sommerfeld, 1998-=-. is linear. Using this linear relationship and Eq. Ž. 6 we can calculate how the funding would have to be redistributed in order to interchange two communities separated by one size rank. For example... |

3 | Power Laws and Athletic Performance
- Katz, Katz
- 1999
(Show Context)
Citation Context ...of two coastlines may be similar but are rarely exactly the same. A prerequisite for finding any law in a natural, physical or social system is having accurate, detailed observations about a system Ž =-=Katz and Katz, 1999-=- . . Locating reliable data is difficult and acquiring such data can be costly. Some likely candidates as sources of social data are census, economic and publication data. However, census and much of ... |

2 |
Lecture Notes on Circuit Complexity and Communication Complexity. IAS Summer School. Available for download from http://www.wisdom.weizmann.ac.il/∼ranraz/lecturenotes/index.html
- Raz
(Show Context)
Citation Context ...ols with error at most ɛ. It is known that there exist functions f : {0, 1} ℓ × {0, 1} ℓ → {0, 1} for which CCɛ(f) = Ω(ℓ); the inner-product function IP (x, y) = �ℓ i=1 xiyi mod 2 is one example. See =-=[10, 15]-=- for more on communication complexity. Let (Mac ∗ , Agg ∗ , Vrfy ∗ ) be an aggregate MAC scheme in which verification of any message can be carried out in time O(log ℓ). At the very least, this implie... |

1 |
The Matthew effect in science II
- Merton
- 1988
(Show Context)
Citation Context ...: S0048-7333 99 00010-4 thermore, the scale-independent nature of a self-similar property is characterised by a power-law distribution. We will show that the Matthew effect in science Ž Merton, 1968; =-=Merton, 1988-=-. and other structural features of the science system are self-similar from the level of a sectoral, domestic, and regional science system through to the level of the world science system. For over a ... |

1 |
Bradford’s law of science bibliography—an interpretation
- Naranan
- 1970
(Show Context)
Citation Context ...the SCI is based on Bradford’s law of scattering Ž Bradford, 1950 . . Bradford did not have a mathematical equation to support his law and it took a while for information scientists to formulate one Ž=-=Naranan, 1970-=-; Garfield, 1971 . . In general, the Bradford distribution of scientific articles in journals for a given subject can be expressed in the functional form J p Apyg Ž . where JŽ p. is the number of jour... |

1 |
Is journal publication obsolescent
- Pasternack
- 1966
(Show Context)
Citation Context ... size of general research disciplines such as medicine are strongly influenced by national priorities and public attitudes. In general, anonymous peer reÕiew mechanisms provide some quality control Ž =-=Pasternack, 1966-=-. of the evaluation and public reporting processes in the scientific community. For example, project funding and journal publications are usually evaluated anonymously by a small group of internationa... |

1 |
The scientific journal—300th anniversary
- Porter
- 1964
(Show Context)
Citation Context ...eer review can be traced to the minutes of Royal Society from March 1, 1664 to 1665 when the council ordered that publications in Philosophical Transactions be reviewed first by some of its members Ž =-=Porter, 1964-=- . . Although peer review has its inefficiencies, Merton Ž 1973. claims that practicing scientists see it as crucial to the development of science. Scientific investigation can be rewarding and genera... |

1 |
Evaluation of the models for Bradford’s law
- Wang, Wang
- 1998
(Show Context)
Citation Context ...ord distribution of scientific articles in journals for a given subject can be expressed in the functional form J p Apyg Ž . where JŽ p. is the number of journals containing p articles on a subject Ž =-=Wang and Wang, 1998-=- . . Eugene Garfield, the founder of ISI, suggested that a small number of journals could account for a large percentage of the significant contributions to all of science. In other words, what Bradfo... |