Message Authentication Schemes for Secure Multicasting
نویسنده
چکیده
Multicast communication is becoming the basis for a growing number of applications. It is therefore critical to provide sound security mechanism for multicast communication. One such solution, secure multicast, is appealing because it leverages the efficiency of multicast data delivery. However, it also presents several research challenges. In this paper, we discuss a packet source authentication problem, i.e., authenticating the sender of a received packet, and review proposed
منابع مشابه
- 1 - Efficient Revocation Schemes for Secure Multicast
Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient g...
متن کاملOn the Multicasting Security of SNMPv3
SNMPv3, a simple network management protocol, is secure in unicasting communications (i.e., point-to-point or end-to-end transmission). Furthermore, a manager and an agent can authenticate and exchange secure transmission between each other with no time delay or replay. In this paper, we extend the SNMPv3 unicasting security solution to be applicable in multicasting applications. In addition, w...
متن کاملSecurity Challenges in Multicast Communication for Mobile Ad Hoc Network
Problem statement: Multicasting communication network accepted a single message from an application and delivered copies of the message to multiple recipients at different locations. Recently, there has been an explosion of research literature on multicast communication environment. The objective of this study were to contribute the complexity of supporting current multicast applications, (i) t...
متن کاملForward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central pri...
متن کاملConstructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
We present a new transformation of chosen-plaintext secure predicate encryption schemes with public index into chosen-ciphertext secure schemes. Our construction requires only a universal one-way hash function and is selectively secure in the standard model. The transformation is not generic but can be applied to various existing schemes constructed from bilinear groups. Using common structural...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000