Skip to main content

Ensuring Authentication of Digital Information Using Cryptographic Accumulators

  • Conference paper
Cryptology and Network Security (CANS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5888))

Included in the following conference series:

Abstract

In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication delay and the packet overhead. In this paper, we address those points by proposing two schemes based on cryptographic accumulators. Our first scheme is developed for erasure channels and its packet overhead is less than the length of a digest most of the time. This makes our construction one of the least expensive protocols for this network model. Even if the sender processes the stream slightly in delay, the receivers can authenticate packets on-the-fly. Our second scheme is designed for adversarial networks. We show that our packet overhead is less than for the construction by Karlof et al. in 2004 and the protocol by Tartary and Wang in 2006 which are two recent efficient schemes dealing with adversarial networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Ibrahim, M., Pieprzyk, J.: Authenticating multicast streams in lossy channels using threshold techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2094, pp. 239–249. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Barreto, P.S., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–369. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions - the HMAC construction. In: RSA Laboratories’ CryptoBytes, vol. 2 (Spring 1996)

    Google Scholar 

  4. Benaloh, J., de Mare, M.: One-way accumulators: A decentralized alternative to digital signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 274–285. Springer, Heidelberg (1994)

    Google Scholar 

  5. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology 17(4), 297–319 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  6. Challal, Y., Bettahar, H., Bouabdallah, A.: A taxonomy of multicast data origin authentication: Issues and solutions. IEEE Communications Surveys and Tutorials 6(3), 34–57 (2004)

    Article  Google Scholar 

  7. Challal, Y., Bouabdallah, A., Bettahar, H.: \(\mbox{H}_{2}\mbox{A}\): Hybrid hash-chaining scheme for adaptive multicast source authentication of media-streaming. Computer & Security 24(1), 57–68 (2005)

    Article  Google Scholar 

  8. Desmedt, Y., Jakimoski, G.: Non-degrading erasure-tolerant information authentication with an application to multicast stream authentication over lossy channels. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 324–338. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Fu, J.C., Lou, W.Y.W.: Distribution Theory of Runs and Patterns and its Applications. World Scientific Publishing, Singapore (2003)

    MATH  Google Scholar 

  10. Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Symposium on Network and Distributed Systems Security, San Diego, USA, pp. 13–22. Internet Society (February 2001)

    Google Scholar 

  11. Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Transactions on Information Theory 45(6), 1757–1767 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  12. Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation codes and applications to DoS resistant multicast authentication. In: 11th Network and Distributed Systems Security Symposium, San Diego, USA (February 2004)

    Google Scholar 

  13. Lidl, R., Niederreiter, H.: Introduction to Finite Fields and their Applications (Revised Edition). Cambridge University Press, Cambridge (2000)

    Google Scholar 

  14. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 241–253. IEEE Press, Los Alamitos (2003)

    Google Scholar 

  15. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)

    MATH  Google Scholar 

  16. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  17. Merkle, R.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  18. Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 232–246. IEEE Press, Los Alamitos (2001)

    Google Scholar 

  19. National Institute of Standards and Technology. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register 72(212), 62212 – 62220 (November 2007)

    Google Scholar 

  20. Nguyen, L.: Accumulators from bilinear pairings and applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 275–292. Springer, Heidelberg (2005)

    Google Scholar 

  21. Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 83–87. Springer, Heidelberg (1996)

    Google Scholar 

  22. Pannetrat, A., Molva, R.: Authenticating real time packet streams and multicasts. In: 7th International Symposium on Computers and Communications, Taormina, Italy. IEEE Computer Society, Los Alamitos (2002)

    Google Scholar 

  23. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 227–240. IEEE Press, Los Alamitos (2002)

    Google Scholar 

  24. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)

    Article  Google Scholar 

  25. Park, Y., Cho, Y.: The eSAIDA stream authentication scheme. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 799–807. Springer, Heidelberg (2004)

    Google Scholar 

  26. Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, Oakland, USA, pp. 56–73. IEEE Press, Los Alamitos (2000)

    Google Scholar 

  27. Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  28. Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the Association for Computing Machinery 36(2), 335–348 (1989)

    MATH  MathSciNet  Google Scholar 

  29. Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Discrete Mathematics and Its Applications. Chapman & Hall/CRC (2006)

    Google Scholar 

  30. Stinson, D.R., Wei, R., Zhu, L.: Some new bounds for cover-free families. Journal of Combinatorial Theory, Series A 90(1), 224–234 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  31. Tartary, C.: Authentication for Multicast Communication. PhD thesis, Department of Computing - Macquarie University (October 2007)

    Google Scholar 

  32. Tartary, C., Wang, H.: Achieving multicast stream authentication using MDS codes. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 108–125. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  33. van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer, Heidelberg (2005)

    Book  MATH  Google Scholar 

  34. Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modeling of the temporal dependence in packet loss. In: IEEE INFOCOM 1999, vol. 1, pp. 345–352. IEEE Press, Los Alamitos (1999)

    Google Scholar 

  35. Yum, D.H., Seo, J.W., Lee, P.J.: Generalized combinatoric accumulator. IEICE Transactions on Information and Systems E91-D(5), 1489–1491 (2008)

    Article  Google Scholar 

  36. Zanotti, J.-P.: Le code correcteur C.I.R.C, http://zanotti.univ-tln.fr/enseignement/divers/chapter3.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tartary, C. (2009). Ensuring Authentication of Digital Information Using Cryptographic Accumulators. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds) Cryptology and Network Security. CANS 2009. Lecture Notes in Computer Science, vol 5888. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10433-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10433-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10432-9

  • Online ISBN: 978-3-642-10433-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics