Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

被引:49
|
作者
Wang, Qiyan [1 ]
Khurana, Himanshu [1 ]
Huang, Ying [1 ]
Nahrstedt, Klara [1 ]
机构
[1] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/INFCOM.2009.5062037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is challenging to provide authentication to time-critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks. In this paper, we propose a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design an efficient multicast authentication scheme "TV-HORS" to meet the above needs. TV-HORS combines one-way hash chains with TV-OTS to avoid frequent public key distribution. It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the order of microseconds). In addition, TV-HORS has perfect tolerance to packet loss and strong robustness against malicious attacks. The communication overhead of TV-HORS is much smaller than regular OTS schemes, and even smaller than RSA signature. The only drawback of TV-HORS is a relatively large public key of size 8KB to 10KB, depending on parameters.
引用
收藏
页码:1233 / 1241
页数:9
相关论文
共 50 条
  • [21] Improving Lamport one-time signature scheme
    Chang, MH
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 118 - 124
  • [22] Digital signature with one-time pair of keys
    Yi, X
    Siew, CK
    Syed, MR
    ELECTRONICS LETTERS, 2000, 36 (02) : 130 - 131
  • [23] Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption
    Im, Jong-Hyuk
    Lee, Mun-Kyu
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 467 - 474
  • [24] Time-critical rendering for time-varying volume data
    Liao, SK
    La, JZC
    Chung, YC
    COMPUTERS & GRAPHICS-UK, 2004, 28 (02): : 279 - 288
  • [25] Determinism for time-critical data transmission
    不详
    IEEE MICRO, 2001, 21 (02) : 86 - 86
  • [26] One-Time Password Authentication with Infinite Hash Chains
    Chefranov, Alexander G.
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 283 - 286
  • [27] Weaknesses and Improvements of a One-time Password Authentication Scheme
    Kim, Mijin
    Lee, Byunghee
    Kim, Seungjoo
    Won, Dongho
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2009, 2 (04): : 29 - 37
  • [28] GENERATION OF ONE-TIME KEYS FOR SINGLE LINE AUTHENTICATION
    Hossain, Sazzad
    Goh, Alwyn
    Sin, Cheong Hoon
    Win, Lee Kay
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [29] Simple and Effective One-time Password Authentication Scheme
    Jiang, Xiangyang
    Ling, Jie
    2013 2ND INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION AND MEASUREMENT, SENSOR NETWORK AND AUTOMATION (IMSNA), 2013, : 529 - 531
  • [30] Sausage-Style One-Time Authentication Schemes
    Suga, Yuji
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2017, 2018, 12 : 658 - 667