Message Authentication Schemes for Secure Multicasting

نویسنده

  • Jong-Hoon Youn
چکیده

Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanism for multicast communication. One such solution, secure multicast, is appealing because it leverages the efficiency of multicast data delivery. However, it also presents several research challenges. In this paper, we discuss a packet source authentication problem, i.e., authenticating the sender of a received packet, and review proposed

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

- 1 - Efficient Revocation Schemes for Secure Multicast

Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient g...

متن کامل

On the Multicasting Security of SNMPv3

SNMPv3, a simple network management protocol, is secure in unicasting communications (i.e., point-to-point or end-to-end transmission). Furthermore, a manager and an agent can authenticate and exchange secure transmission between each other with no time delay or replay. In this paper, we extend the SNMPv3 unicasting security solution to be applicable in multicasting applications. In addition, w...

متن کامل

Security Challenges in Multicast Communication for Mobile Ad Hoc Network

Problem statement: Multicasting communication network accepted a single message from an application and delivered copies of the message to multiple recipients at different locations. Recently, there has been an explosion of research literature on multicast communication environment. The objective of this study were to contribute the complexity of supporting current multicast applications, (i) t...

متن کامل

Forward-Security in Private-Key Cryptography

This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central pri...

متن کامل

Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions

We present a new transformation of chosen-plaintext secure predicate encryption schemes with public index into chosen-ciphertext secure schemes. Our construction requires only a universal one-way hash function and is selectively secure in the standard model. The transformation is not generic but can be applied to various existing schemes constructed from bilinear groups. Using common structural...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000