Efficient Provider Authentication for Bidirectional Broadcasting Service

被引:2
|
作者
Ohtake, Go [1 ]
Hanaoka, Goichiro [2 ]
Ogawa, Kazuto [1 ]
机构
[1] NHK Japan Broadcasting Corp, Sci & Technol Res Lab, Tokyo 1578510, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1010021, Japan
关键词
bidirectional broadcasting service; provider authentication; personal information protection; key leakage; strong key-insulated signature; KEY-INSULATED SIGNATURE; SCHEME; SECURE;
D O I
10.1587/transfun.E93.A.1039
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Provider authentication is necessary in bidirectional broadcasting services, and a digital signature scheme is often used to prevent an adversary from attempting impersonation. The cost of secure signing key management is extremely high. In addition, the key has to be updated very often, since it is frequently used. The result is that the verification key also has to be updated very often, and its redistribution cost is huge. These costs are real and substantive problems, especially when the number of users is large. In this paper, we propose a system that dramatically reduces these costs. In the system, the signing key is updated, but the corresponding verification key does not have to be updated. This means that the signing key can be updated without any cost for redistributing the verification key and that the system is secure against the threat of signing key leakage. since the key can be frequently updated. Moreover, we propose a new key management method that divides a conventional key management server's role into two. The use of a key-insulated signature (KIS) scheme enables low-cost and more secure key management with two servers. Finally, to make a bidirectional broadcasting service more secure even if the signing key is leaked, we developed a new strong KIS scheme. We performed an experiment that assessed the cost of our strong KIS scheme and found that it is sufficiently low. Accordingly, a provider authentication system employing this scheme would be more efficient and would have lower key redistribution and network costs in comparison with conventional authentication systems.
引用
收藏
页码:1039 / 1051
页数:13
相关论文
共 50 条
  • [1] A practical provider authentication system for bidirectional broadcast service
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Matsuura, Kanta
    Imai, Hideki
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 967 - +
  • [2] A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks
    Xu, Lin
    Wen, Mi
    Li, Jinguo
    [J]. 2015 IEEE CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2015, : 200 - 204
  • [3] Robust and Efficient Authentication of Video Stream Broadcasting
    Oligeri, Gabriele
    Chessa, Stefano
    Di Pietro, Roberto
    Giunta, Gaetano
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [4] Assurance Requirements for Mutual User and Service Provider Authentication
    Josang, Audun
    [J]. DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 26 - 44
  • [5] Efficient multicasting and broadcasting in layer 2 provider backbone networks
    Elangovan, A
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (11) : 166 - 170
  • [6] SIMULTANEOUS AUTHENTICATION AND AUTHORIZATION MECHANISMS FOR A MASSIVELY LARGE MULTIMEDIA BROADCASTING SERVICE
    Deng Zhongliang
    Lin Wenliang
    Li Ning
    Han Ke
    Hou Yunlong
    Zhang Lin
    [J]. ELECTRONICS WORLD, 2014, 120 (1943): : 34 - 36
  • [7] Efficient Job Provisioning for a Cloud Service Provider
    Sharma, Dharmvir
    Singh, Tejinderpal
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN ENGINEERING & TECHNOLOGY (ICAET-2016), 2016, 57
  • [8] A fast and efficient source authentication solution for broadcasting in wireless sensor networks
    Wu, Taojun
    Cui, Yi
    Kusy, Brano
    Ledeczi, Akos
    Sallai, Janos
    Skirvin, Nathan
    Werner, Jan
    Xue, Yuan
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 53 - 63
  • [9] An experimental study of next generation authentication mechanisms for wireless LAN and content service provider
    Huber, Rainer
    Jordan, Norbert
    [J]. IASTED INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMERGING TECHNOLOGIES, 2005, : 80 - 85
  • [10] An Efficient Scheme to Ensure Data Availability for a Cloud Service Provider
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    Jin, Chao
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,