期刊文献+

基于消息认证码的安全有效的组播源认证 被引量:1

Secure and Efficient Source Authentication for Multicast Based on Message Authentication Codes
下载PDF
导出
摘要 组播通信正成为不断增长的应用基础,而其关键是要为组播通信提供可靠的安全机制。然而,现有的组播安全协议仅能提供部分的解决方法。考虑到源认证是组播的最主要安全事务之一,文章基于消息认证码提出了一种安全有效的组播源认证方法。 Multicast communication is becoming the basis for a growing number of applications. It is therefor critical to provide sound security mechanisms for multicast communication. Yet,existing security protocols for multicast offer only partial solutions. Owing to the source authentication of multicast that is one of major security concerns of multicast communication,a secure and efficient source authentication scheme for multicast is present by means of Message Authentication Codes.
出处 《微电子学与计算机》 CSCD 北大核心 2002年第6期13-17,共5页 Microelectronics & Computer
基金 国家973计划资助项目(G1998030600) 福建省自然科学基金项目(F00013) 福州大学科技发展基金项目(XKJ(QD)-0121)
关键词 消息认证码 组播源认证 组播通信 组播安全协议 INTERNET Multicast communication, Source authentication, Multicast security protocols
  • 相关文献

参考文献17

  • 1[1]Perlman R,Lee C,Ballardie T et al. Simple Multicast:A Design for Simple,Low- overhead Multicast. Internet Draft,Internet Engineering Task Force,Mar.1999.
  • 2[2]Handley M,Holbrook H,Kouvelas I. Protocol Independent Multicast- sparse Model(prim- sm):Protocol Specification. Internet Draft, Internet Engineering Task Force, July 2000.
  • 3[3]Bhaskar N,Kouvelas I. Source Specific Protocol Independent Multicast. Internet Draft,Internet Engineering Task Force,Mar.2000.
  • 4[4]Harney H,Muckenhirn C. Group Key Management Protocol(GKMP)architecture. RFC 2094,July 1997.
  • 5[5]Mittra S. Iolus:A Framework for Scalable Secure Multicasting. Proc. of the ACM SIGCOMM'97,Cannes,France,Sept.1997.
  • 6[6]Ballardie A J. A New Approach to Multicast Communication in a Datagram Network. Ph.D. Thesis,University College London,May 1995.
  • 7[7]Wong C K,Lam Goudaand S. Secure Group Communications Using Key Graphs. Sigcomm'98.
  • 8[8]Desmedt Y,Frankel Y,Yung M. Threshold Cryptosystems. Advances in Cryptology- Crypto'89,Springer- Verlag,1990,435:307~ 315.
  • 9[9]Gemmel P. An Introduction to Threshold Cryptology. In Cryptology- CRYPTO'92,1994,839:257~ 270.
  • 10[10]Canetti R,Gennaro R,Herzberg D,Naor D. Proactive Security:Long- term Protection Against Break- ins. CryptoBytes,1997,3(1).

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部