高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

IP组播不可否认数据源认证研究进展

张海波 周贤伟 宋存义

张海波, 周贤伟, 宋存义. IP组播不可否认数据源认证研究进展[J]. 电子与信息学报, 2006, 28(11): 2205-2208.
引用本文: 张海波, 周贤伟, 宋存义. IP组播不可否认数据源认证研究进展[J]. 电子与信息学报, 2006, 28(11): 2205-2208.
Zhang Hai-bo, Zhou Xian-wei, Song Cun-yi. Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation[J]. Journal of Electronics & Information Technology, 2006, 28(11): 2205-2208.
Citation: Zhang Hai-bo, Zhou Xian-wei, Song Cun-yi. Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation[J]. Journal of Electronics & Information Technology, 2006, 28(11): 2205-2208.

IP组播不可否认数据源认证研究进展

Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation

  • 摘要: 数据源认证是组播安全体系中重要的一部分,数据源认证可以分为可否认的和不可否认的两种。该文按照协议分类分别概述了几个具有代表性的不可否认数据源认证协议,并对每一个协议的优缺点和存在问题进行了讨论。对目前IP组播不可否认数据源认证协议进行了总结,并讨论了不可否认数据源认证未来的研究方向和还需要解决的问题。
  • [1] Deering S E, Cheriton D R. Host groups: A multicast extension to the Internet protocol. (RFC966), Dec,1985. [2] 赵膺,宋佳兴,徐万鸿,刘卫东. 安全组播综述[J]. 小型微型计算机系统,2003, 24(10): 1873-1877. [3] Hardjono T, Tsudik G. IP multicast security: Issues and directions. Annales de Telecom, July-August 2000: 324-340. [4] Gennaro R, Rohatgi P. How to sign digital streams[J].Information and Computation.2001,165(1):100-116 [5] Gennaro R, Rohatgi P. How to sign digital streams. Proceedings of the 17th Annual International Cryptology Conference, Advances in Cryptology - Crypto97, 17-21 August 1997, vol. 1294 of Lecture notes in computer science, Springer: 180-197. [6] Perrig A, Canetti R, Tygar J D, Song D. Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy, May, 2000: 56-73. [7] Miner S, Staddon J. Graph-based authentication of digital streams. IEEE Symposium on Security and Privacy, Oakland, California, USA, May, 2001: 232-246. Golle P, Modadugu N. Authenticating streamed data in the presence of random packet loss. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), the Internet Society, San Diego, USA, Feb, 2001: 13-22. [8] Wong C K, Lam S S. Digital signatures for flows and multicasts. in Progress of IEEE Internet Conference on Network Protocols, AICNP98, Austin, Texas, USA. Oct. 1998: 198-209. [9] Wong C K, Lam S S. Digital signatures for flows and multicasts[J].IEEE/ACM Transactions on Networking.1999, 7(4):502- [10] Park J M, Chong E K P, Siegel H J. Efficient multicast packet authentication using signature amortization. IEEE Symposium on Security and Privacy, Oakland, California, USA, May, 2002: 227-240. [11] Park J M, Chong E K P, Siegel H J. Efficient multicast stream authentication using erasure codes[J].ACM Transactions on Information and System Security.2003, 6(2):258-285 [12] Rabin M O. Efficient dispersal of information for security, loadbalancing, and fault tolerance. Journal of Association for Computing Machinery, 1989, 36(2): 335-348. [13] Even S, Goldreich O, Micali S. On-line/off-line digital signatures[J].Advances in CryptologyCRYPTO '89, Lecture Notes in Computer Science, (G. Brassard, ed.), Springer Verlag.1990, vol. 435:263-275 [14] Even S, Goldreich O, Micali S. On-line/off-line digital signatures[J].Journal of Cryptology.1996, 9(1):35-67
  • 加载中
计量
  • 文章访问数:  2164
  • HTML全文浏览量:  86
  • PDF下载量:  810
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-04-07
  • 修回日期:  2005-12-30
  • 刊出日期:  2006-11-19

目录

    /

    返回文章
    返回