Abstract
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet overhead. In this paper, we address those points by proposing two schemes based on cryptographic accumulators. Our first scheme is developed for erasure channels and its packet overhead is less than the length of a digest most of the time. This makes our construction one of the least expensive protocols for this network model. Even if the sender processes the stream slightly in delay, the receivers can authenticate packets on-the-fly. Our second scheme is designed for adversarial networks. We show that our packet overhead is less than for the construction by Karlof et al. in 2004 and the protocol by Tartary and Wang in 2006 which are two recent efficient schemes dealing with adversarial networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Al-Ibrahim, M., Pieprzyk, J.: Authenticating multicast streams in lossy channels using threshold techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 239–249. Springer, Heidelberg (2001)
Barreto, P.S., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–369. Springer, Heidelberg (2002)
Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions - the HMAC construction. In: RSA Laboratories’ CryptoBytes, vol. 2 (Spring 1996)
Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology 17(4), 297–319 (2004)
Challal, Y., Bettahar, H., Bouabdallah, A.: A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys and Tutorials 6(3), 34–57 (2004)
Challal, Y., Bouabdallah, A., Bettahar, H.: \(\mbox{H}_{2}\mbox{A}\): Hybrid hash-chaining scheme for adaptive multicast source authentication of media-streaming. Computer & Security 24(1), 57–68 (2005)
Desmedt, Y., Jakimoski, G.: Non-degrading erasure-tolerant information authentication with an application to multicast stream authentication over lossy channels. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 324–338. Springer, Heidelberg (2006)
Fu, J.C., Lou, W.Y.W.: Distribution Theory of Runs and Patterns and its Applications. World Scientific Publishing, Singapore (2003)
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Symposium on Network and Distributed Systems Security, San Diego, USA, pp. 13–22. Internet Society (February 2001)
Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Transactions on Information Theory 45(6), 1757–1767 (1999)
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation codes and applications to DoS resistant multicast authentication. In: 11th Network and Distributed Systems Security Symposium, San Diego, USA (February 2004)
Lidl, R., Niederreiter, H.: Introduction to Finite Fields and their Applications (Revised Edition). Cambridge University Press, Cambridge (2000)
Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 241–253. IEEE Press, Los Alamitos (2003)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 232–246. IEEE Press, Los Alamitos (2001)
National Institute of Standards and Technology. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register 72(212), 62212 – 62220 (November 2007)
Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275–292. Springer, Heidelberg (2005)
Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83–87. Springer, Heidelberg (1996)
Pannetrat, A., Molva, R.: Authenticating real time packet streams and multicasts. In: 7th International Symposium on Computers and Communications, Taormina, Italy. IEEE Computer Society, Los Alamitos (2002)
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 227–240. IEEE Press, Los Alamitos (2002)
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Park, Y., Cho, Y.: The eSAIDA stream authentication scheme. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 799–807. Springer, Heidelberg (2004)
Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 56–73. IEEE Press, Los Alamitos (2000)
Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the Association for Computing Machinery 36(2), 335–348 (1989)
Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Discrete Mathematics and Its Applications. Chapman & Hall/CRC (2006)
Stinson, D.R., Wei, R., Zhu, L.: Some new bounds for cover-free families. Journal of Combinatorial Theory, Series A 90(1), 224–234 (2000)
Tartary, C.: Authentication for Multicast Communication. PhD thesis, Department of Computing - Macquarie University (October 2007)
Tartary, C., Wang, H.: Achieving multicast stream authentication using MDS codes. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 108–125. Springer, Heidelberg (2006)
van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)
Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modeling of the temporal dependence in packet loss. In: IEEE INFOCOM 1999, vol. 1, pp. 345–352. IEEE Press, Los Alamitos (1999)
Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Transactions on Information and Systems E91-D(5), 1489–1491 (2008)
Zanotti, J.-P.: Le code correcteur C.I.R.C, http://zanotti.univ-tln.fr/enseignement/divers/chapter3.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tartary, C. (2009). Ensuring Authentication of Digital Information Using Cryptographic Accumulators. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds) Cryptology and Network Security. CANS 2009. Lecture Notes in Computer Science, vol 5888. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10433-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-10433-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10432-9
Online ISBN: 978-3-642-10433-6
eBook Packages: Computer ScienceComputer Science (R0)