A Robust Multicast Authentication Scheme Based on Asymmetric Key Signature

被引:0
|
作者
Christianah, Opayinka A. [1 ]
Boniface, Alese K. [1 ]
Aderonke, Thompson F. [1 ]
Olufunso, Alowolodu D. [1 ]
Festus, Osuolale A. [1 ]
机构
[1] Fed Univ Technol Akure, Dept Comp Sci, Akure, Nigeria
关键词
components: multicast Authentication; Information Dispersal Algorithm; Signature Amortization Technique;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over multiple packets. Authentication scheme for Multicast message packets design was based on signature amortization technique. This reduces the computation overhead and ensures verification when there is packet loss. The design was simulated with a number of messages sent to a chosen number of receivers. Probabilities of loss were calculated for each transmission. The performance was compared with three other existing schemes to ascertain its efficiency. It was observed that our technique is efficient in packets authentication in a lossy environment especially with reduced space overhead.
引用
收藏
页码:449 / 458
页数:10
相关论文
共 50 条
  • [21] RAKS: robust authentication and key agreement scheme for satellite infrastructure
    Khan, Akber Ali
    Kumar, Vinod
    Srinivas, Jangirala
    Kumari, Saru
    Gupta, Mridul Kumar
    TELECOMMUNICATION SYSTEMS, 2022, 81 (01) : 83 - 98
  • [22] RAKS: robust authentication and key agreement scheme for satellite infrastructure
    Akber Ali Khan
    Vinod Kumar
    Jangirala Srinivas
    Saru Kumari
    Mridul Kumar Gupta
    Telecommunication Systems, 2022, 81 : 83 - 98
  • [23] A hierarchical signature scheme for robust video authentication using secret sharing
    Atrey, PK
    Yan, WQ
    Chang, EC
    Kankanhalli, MS
    10TH INTERNATIONAL MULTIMEDIA MODELLING CONFERENCE, PROCEEDINGS, 2004, : 330 - 337
  • [24] A Lightweight Dynamic Multicast Authentication Scheme
    Yao, Xuanxia
    Zhou, Xianwei
    Du, Xiaojiang
    2014 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2014, : 595 - 600
  • [25] An asymmetric multicast fingerprinting scheme based on secret sharing
    Ren Yanzhen
    Hu RuiMin
    Ai Haojun
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 211 - 214
  • [26] Dynamic group signature scheme based on network authentication
    Si, Guang-Dong
    Dong, Qing-Kuan
    Yang, Jia-Xi
    Xiao, Guo-Zhen
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2008, 29 (05): : 504 - 508
  • [27] New image authentication scheme based on digital signature
    Liu, BF
    Zhang, WJ
    Yu, SY
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 302 - 307
  • [28] A robust content based digital signature for image authentication
    Schneider, M
    Chang, SF
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 227 - 230
  • [29] A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME
    CHANG, CC
    LIAO, WY
    COMPUTERS & SECURITY, 1994, 13 (02) : 137 - 144