Abstract
To enable widespread commercial stream services, authentication is an important and challenging problem. As for multicast authentication, recently proposed schemes well-operate in adversarial network environment where an enemy can inject a large amount of invalid packets to choke the decoding process in the receivers, at the expense of a large communication overhead. In this paper, we present two efficient DoS resistant multicast authentication algorithms. To detect DoS attack, they require loose time-syncronization or delay of sending the packets, respectively. Compared with the previous schemes, they have much lower communication overhead and smaller computation cost on the receivers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C. (April 1995)
Bleichenbacher, D., Maurer, U.: Optimal tree-based one-time digital signature schemes. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 363–374. Springer, Heidelberg (1996)
Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001, pp. 13–22 (2001)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient Multicast Packet Authentication Using Signature Amoritization. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: 8th ACM Conference on Computer and Communication Security, November 2001, pp. 28–37 (2001)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of IEEE Security and Privacy Symposium (May 2000)
Rabin, M.O.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the Association for Computing Machinery 36(2), 335–348 (1989)
Rivest, R.L., Shamir, A., Adelman, L.M.: A Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: 6th ACM Conference on Computer and Communication Security (November 1999)
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)
Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Muticast Authentication in Fully Adversarial Networks. In: IEEE S&P 2004 (2004)
Pannetrat, A., Molva, R.: Efficient Multicast Packet Authentication. In: NDSS 2003 (2003)
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation Codes and Applications to DoS Resistant Multicast Authentication. In: NDSS 2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, J., Park, Y., Cho, Y. (2005). Efficient DoS Resistant Multicast Authentication Schemes. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_37
Download citation
DOI: https://doi.org/10.1007/11424826_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)