Advanced Search
Volume 37 Issue 5
May  2015
Turn off MathJax
Article Contents
Li Jian-Bing, Li Qing, Dong Qing-Kuan, Li Xiao-Ping. A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1227-1233. doi: 10.11999/JEIT140884
Citation: Li Jian-Bing, Li Qing, Dong Qing-Kuan, Li Xiao-Ping. A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel[J]. Journal of Electronics & Information Technology, 2015, 37(5): 1227-1233. doi: 10.11999/JEIT140884

A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel

doi: 10.11999/JEIT140884
  • Received Date: 2014-07-07
  • Rev Recd Date: 2014-09-28
  • Publish Date: 2015-05-19
  • Multicast is a widely applied communication technology. Multicast source authentication is an important problem in multicast security. Especially, it is a big challenge to implement the multicast source authentication in a noisy channel. In order to solve the problem of multicast source authentication in the noisy channel, a chained multicast source authentication technology based on the threshold cryptography is proposed. Firstly, the security assumption and security model of the chained multicast source authentication is provided based on the security requirement of the multicast source authentication and Dolev-Yao model. Then, a new multicast source authentication protocol adapted to the noisy channel is designed by using the threshold secret sharing technology. Finally, the security of the proposed protocol is analyzed. The simulation results show that the multicast source authentication protocol has a good ability to resist packet loss and ensure good communication performance.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1220) PDF downloads(359) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return