Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

被引:49
|
作者
Wang, Qiyan [1 ]
Khurana, Himanshu [1 ]
Huang, Ying [1 ]
Nahrstedt, Klara [1 ]
机构
[1] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/INFCOM.2009.5062037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is challenging to provide authentication to time-critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks. In this paper, we propose a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design an efficient multicast authentication scheme "TV-HORS" to meet the above needs. TV-HORS combines one-way hash chains with TV-OTS to avoid frequent public key distribution. It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the order of microseconds). In addition, TV-HORS has perfect tolerance to packet loss and strong robustness against malicious attacks. The communication overhead of TV-HORS is much smaller than regular OTS schemes, and even smaller than RSA signature. The only drawback of TV-HORS is a relatively large public key of size 8KB to 10KB, depending on parameters.
引用
收藏
页码:1233 / 1241
页数:9
相关论文
共 50 条
  • [41] WiP Abstract: Multicast Authentication in the Smart Grid with One-Time Signatures from Sigma-Protocols
    Katti, Raj S.
    Sule, Rucha
    Kavasseri, Rajesh G.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 239 - 239
  • [42] Cryptanalysis of digital signature with one-time pair of keys
    Wu, QX
    Yang, YX
    Hu, ZM
    CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (03): : 391 - 392
  • [43] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [44] Security of digital signature with one-time pair of keys
    Tseng, YM
    Jan, JK
    Chien, HY
    ELECTRONICS LETTERS, 2000, 36 (16) : 1374 - 1375
  • [45] Time-Critical Search
    Mishra, Nina
    White, Ryen W.
    Ieong, Samuel
    Horvitz, Eric
    SIGIR'14: PROCEEDINGS OF THE 37TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2014, : 747 - 756
  • [46] Time-critical Support
    Walker, Simon
    E&MJ-ENGINEERING AND MINING JOURNAL, 2012, 213 (04): : 32 - +
  • [47] On time-critical data transmission of EtherNet/IP
    Qian, Xiaolong
    He, Shengming
    Guo, Danning
    Jing, Yuanwei
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 4623 - +
  • [48] Time-critical data transmission in the foundation fieldbus
    Hong, SH
    Jang, BD
    ISIE 2001: IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS PROCEEDINGS, VOLS I-III, 2001, : 555 - 559
  • [49] Time-based One-Time Password for Wi-Fi Authentication and Security
    Sudar, Chandramohan
    Arjun, S. K.
    Deepthi, L. R.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1212 - 1215
  • [50] Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
    Firsov, Denis
    Lakk, Henri
    Truu, Ahto
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 621 - 633