Rec. ITU-T X.1366 (09/2020) Aggregate message authentication schemes for Internet of things environment
Summary
History
FOREWORD
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview and basic concept
     6.1 Overview
     6.2 Basic concept of aggregate message authentication system
          6.2.1 General
7 Aggregate message authentication
     7.1 General
     7.2 Specific notation
     7.3 Algorithm specification
          7.3.1 XOR-based construction
               7.3.1.1 Key generation
               7.3.1.2 Tagging
               7.3.1.3 Aggregation
               7.3.1.4 Verification
          7.3.2 Hash-based construction
               7.3.2.1 Key generation
               7.3.2.2 Tagging
               7.3.2.3 Aggregation
               7.3.2.4 Verification
8 Interactive aggregate message authentication
     8.1 General
     8.2 Specific notation
     8.3 Specification of interactive protocol
          8.3.1 XOR-based construction
               8.3.1.1 Key generation
               8.3.1.2 Tagging
               8.3.1.3 Aggregation and verification
          8.3.2 Hash-based construction
               8.3.2.1 Key generation
               8.3.2.2 Tagging
               8.3.2.3 Aggregation and verification
Annex A   Guidance and limitations
     A.1 Guidance on use of aggregate message authentication (AMA)
     A.2 Limitations of the use of AMA
Annex B  Combination with existing one-to-one authentication protocols
Appendix I   Use cases on the use of AMA
     I.1 Introduction
     I.2 Use case-1: Theme parks and leisure centres
     I.3 Use case-2: Surveillance sensors
          I.3.1 General
          I.3.2 Specific use cases
Appendix II  Related activities on AMA schemes
Appendix III  Adaptive group testing protocol
Bibliography