Skip to main content

An Efficient Authentication Scheme Using Recovery Information in Signature

  • Conference paper
Information and Communications Security (ICICS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3269))

Included in the following conference series:

Abstract

This paper proposes an efficient authentication scheme for multicast packets using Recovery Information in Signature (RIS) to provide source authentication. The problems of the existing schemes are as follows: TESLA requires time synchronization between the sender and the receiver, and hash-based schemes have high communication overheads due to additional hash values and require many buffers and delay for verification on receivers. Our main focus is reducing the buffer size, communication, and computation burden of the receiver. The proposed scheme in this paper is highly robust to packet loss using the recovery layer based on XOR operation. It also provides low communication overhead, low verification cost, non- repudiation of the origin, immediate verification, and robustness against DoS attack on the receiver.

This work was supported by KOREA SCIENCE & ENGINEERING FOUNDATION (F01-2003-000-00012-0)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Judge, P., Ammar, M.: Security issues and solutions in multicast content distribution: a survey. IEEE Network 17(1), 30–36 (2003)

    Article  Google Scholar 

  2. Al-Ibrahim, M., Pieprzyk, J.: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 239–249. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Perrig, A., Canetti, R., Tygar, J.D.: Dawn Song: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. of IEEE Security and Privacy Symposium S&P 2000 (2000)

    Google Scholar 

  4. Perrig, Canetti, Song, Tygar, Briscoe: TESLA: Multicast Source Authentication Transform Introduction, IETF MSEC WG draft-ietf-msec-tesla-intro-00.txt (2002)

    Google Scholar 

  5. Karlof, C.: http://www.cs.berkeley.edu/~ckarlof/research/multicast-security/related.html

  6. Canetti, R., et al.: Multicast Security: A Taxonomy and Efficient Constructions. In: IEEE INFOCOM, New York (1999)

    Google Scholar 

  7. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  8. Wong, C., Lam, S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Trans. Net. 7 (1999)

    Google Scholar 

  9. Cucinotta, T., Cecchetti, G., Ferraro, G.: Adopting redundancy techniques for multicast stream authentication. In: Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 (2003)

    Google Scholar 

  10. Karlstedt, M.: Secure Multicast in the Internet, Seminar on Network Security, http://www.cs.helsinki.fi/u/asokan/distsec/documents/karlstedt.ps.gz

  11. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, K., Jung, S. (2004). An Efficient Authentication Scheme Using Recovery Information in Signature. In: Lopez, J., Qing, S., Okamoto, E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30191-2_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30191-2_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23563-7

  • Online ISBN: 978-3-540-30191-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics