期刊文献+

高效的动态组播群通信认证签字方案 被引量:3

Efficient Authentication Signature Schemes for Dynamic Multicast Groups
下载PDF
导出
摘要 由于组播群组的动态性和数据传送的不可靠性 ,相对于点到点通信 ,组播通信的安全认证更为复杂 .在组播数据发送源认证问题中 ,签字的速度和长度是实现认证的主要障碍 .为了解决这个问题 ,通过引入新的认证技术——认证矩阵 ,提出了一个有效的适用于大数量动态的群组和不可靠数据传送的组播认证签字方案 .相对于目前的组播包认证方案 ,该方案可显著地降低签字长度 ,提高签字速度 ,并可提供不可抵赖服务 ,可应用于如多媒体数据传输。 Maintaining authenticity for multicast communication is inherently more complex than for unicast, which dues to the dynamic group and unreliable delivery. In the implementation of multicast authentication, the major obstacles lie on the lower signature rate and larger signature size overhead. To solve this problem, by using a new authentication technique called authentication matrix, a new signature scheme is proposed for large and dynamic multicast groups that can be used on the unreliable delivery network. Comparing with the existing schemes, in this scheme, the signature size overhead is much smaller and the signature rate is much higher, and it can provide the non-repudiation serve. It can be used in many practical fields such as multimedia data transmission, live multi-party conferencing and long-distance education.
出处 《软件学报》 EI CSCD 北大核心 2001年第10期1486-1494,共9页 Journal of Software
基金 国家自然科学基金资助项目 (6 0 0 730 0 6 ) 国防预研基金资助项目 (0 0 J16 .5 .4.HK0 135 ) 国防基础科研基金资助项目 (JI30 0 B0 0 4) 北京市科技新星计划资助项目 (95 2 8740 0 0 )~~
关键词 组播通信 数字签字 安全认证 计算机网络 Multicasting Network protocols Security of data
  • 相关文献

参考文献1

  • 1吴世忠(译),应用密码学:协议、算法与C源程序,2000年

同被引文献21

  • 1何永忠,冯登国.一个组播源认证方案的安全分析[J].计算机工程,2006,32(18):12-13. 被引量:3
  • 2闫俐,朱建明.一种安全高效的无线群组密钥分配协议[J].计算机应用研究,2007,24(2):138-139. 被引量:3
  • 3Yung Chaochen, Lee Jianwei. Introduction and Applications and Security of IPV4 & IPV6 Based Multicast[J].Communications of the CCISA, 2003,9(2):19-33.
  • 4Gennaro R,Rohatgi P.How to Sign Digital Streams[M].Berlin:Springer-Verlag,1997:180-197.
  • 5Canneti R.Garay J,Itkis G,et al.Multicast Security:A Taxonomy and Some Efficient Construction[C].Proceedings of the 6th ACM Computer and Communications Security Conference,1999:93-100.
  • 6Golle P,Modadugu N.Authenticating Streamed Data in the Presence of Random Packet Loss[C].ISOC Network and Distributed System Security Symposium,2001:13-22.
  • 7Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C].Proceedings of the 1st Conference on Computer and Communications Security,1992:62-73.
  • 8Goldreich O.Foundations of Cryptography:Basic Tools[M].Cambridge University Press,2001.
  • 9Canneti R. Garay. J., Itkis G., et al. Multicast security: a taxonomy and some efficient construction[ A ]. In Proceedings of the 6^th ACM Computer and Communications Security Conference[C]. Singapore:ACM Press, 1999.93 - 100.
  • 10Gennaro R., Rohatgi P. How to sign digital streams[ A]. Advances in Cryptology, CRYPTO' 97 [ C ], Berlin, Springer-Verlag, 1997,180 - 197.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部