期刊文献+

IP组播不可否认数据源认证研究进展

Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation
下载PDF
导出
摘要 数据源认证是组播安全体系中重要的一部分,数据源认证可以分为可否认的和不可否认的两种。该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。对目前IP组播不可否认数据源认证协议进行了总结,并讨论了不可否认数据源认证未来的研究方向和还需要解决的问题。 Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.
机构地区 北京科技大学
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第11期2205-2208,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金项目(60573050) 北京市优秀人才培养专项基金(20042D0500103)资助课题
关键词 IP组播 数据源认证 不可否认 IP multicast, Data origin authentication, Non-repudiation
  • 相关文献

参考文献15

  • 1Deering S E,Cheriton D R.Host groups:A multicast extension to the Internet protocol.(RFC966),Dec,1985.
  • 2赵膺,宋佳兴,徐万鸿,刘卫东.安全组播综述[J].小型微型计算机系统,2003,24(10):1873-1877. 被引量:8
  • 3Hardjono T,Tsudik G.IP multicast security:Issues and directions.Annales de Telecom,July-August 2000:324-340.
  • 4Gennaro R,Rohatgi P.How to sign digital streams.Information and Computation,2001,165(1):100-116.
  • 5Gennaro R,Rohatgi P.How to sign digital streams.Proceedings of the 17th Annual International Cryptology Conference,Advances in Cryptology-Crypto'97,17-21 August 1997,vol.1294 of‘Lecture notes in computer science,' Springer:180-197.
  • 6Perrig A,Canetti R,Tygar J D,Song D.Efficient authentication and signing of multicast streams over Iossy channels.IEEE Symposium on Security and Privacy,May,2000:56-73.
  • 7Miner S,Staddon J.Graph-based authentication of digital streams.IEEE Symposium on Security and Privacy,Oakland,California,USA,May,2001:232-246.
  • 8Golle P,Modadugu N.Authenticating streamed data in the presence of random packet loss.In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001),the Internet Society,San Diego,USA,Feb,2001:13-22.
  • 9Wong C K,Lam S S.Digital signatures for flows and multicasts.in Progress of IEEE Internet Conference on Network Protocols,AICNP'98,Austin,Texas,USA.Oct.1998:198-209.
  • 10Wong C K,Lam S S.Digital signatures for flows and multicasts.IEEE/ACM Transactions on Networking,1999,7(4):502-513.

二级参考文献7

  • 1Deering S. Host extensions for IP muhicast [S]. RFC111,1989.
  • 2Ballardie A and Crowcroft J. Multicast-specific security threats and counter-measures [C]. In: Proceedings of the 1995 Symposium on Network and Distributed Systems Security (NDSS'95),San Diego, February 1995, ISOC.
  • 3Canetti R, Pinkas B. A taxonomy of muhicast security issues[Z]. Draft-irtf-smug-taxonomy-01. txt, August 2000, Work in Progress.
  • 4Matthew J. Moyer, Josyula R. Rao, Pankaj Rohatgi. A survey of security issues [Z]. Multicast Communications, December1999.
  • 5Xu Wan-hong. Research on secure multicast[D]. Master Thesisof Tsinghua University, June, 2001.
  • 6Chung Kei-wong, Mohamed Gouda, Simon S Lam. Secure group communications using key graphs [C]. In: Proceedings of ACM SIGCOMM'98, September, 1998.
  • 7Caronni G, Waldvogel M, Sun D and Plattner B. Efficient security for large and dynamic multicast groups[R]. TIK-Report No.41, February 1998.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部