Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

被引:49
|
作者
Wang, Qiyan [1 ]
Khurana, Himanshu [1 ]
Huang, Ying [1 ]
Nahrstedt, Klara [1 ]
机构
[1] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/INFCOM.2009.5062037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is challenging to provide authentication to time-critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks. In this paper, we propose a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design an efficient multicast authentication scheme "TV-HORS" to meet the above needs. TV-HORS combines one-way hash chains with TV-OTS to avoid frequent public key distribution. It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the order of microseconds). In addition, TV-HORS has perfect tolerance to packet loss and strong robustness against malicious attacks. The communication overhead of TV-HORS is much smaller than regular OTS schemes, and even smaller than RSA signature. The only drawback of TV-HORS is a relatively large public key of size 8KB to 10KB, depending on parameters.
引用
收藏
页码:1233 / 1241
页数:9
相关论文
共 50 条
  • [11] Slingshot: Time-critical multicast for clustered applications
    Balakrishnan, M
    Pleisch, S
    Birman, K
    FOURTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2005, : 205 - 212
  • [12] NDNOTA: NDN One-Time Authentication
    Aldaoud, Manar
    Al-Abri, Dawood
    Kausar, Firdous
    Awadalla, Medhat
    INFORMATION, 2024, 15 (05)
  • [13] Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems
    Tefek, Utku
    Esiner, Ertem
    Mashima, Daisuke
    Chen, Binbin
    Hu, Yih-Chun
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1039 - 1048
  • [14] One-time digital signature and pseudo k-time digital signature
    Miyano, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1998, E81A (01) : 48 - 55
  • [15] Authentication Protocols Based on One-Time Passwords
    Babkin, Sergey
    Epishkina, Anna
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1794 - 1798
  • [16] Masquerade on one-time password authentication scheme
    Lin, Chun-Li
    Hung, Ching-Po
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 278 - 282
  • [17] An Improved One-time Password Authentication Scheme
    Liu, Huiyi
    Zhang, Yuegong
    2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 1 - 5
  • [18] Design of a Time and Location Based One-Time Password Authentication Scheme
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 201 - 206
  • [19] On the Security of the Winternitz One-Time Signature Scheme
    Buchmann, Johannes
    Dahmen, Erik
    Ereth, Sarah
    Huelsing, Andreas
    Rueckert, Markus
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 363 - 378
  • [20] Lightweight One-Time Signature for Short Messages
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (07) : 1567 - 1575