Advanced Search
Volume 28 Issue 11
Sep.  2010
Turn off MathJax
Article Contents
Zhang Hai-bo, Zhou Xian-wei, Song Cun-yi. Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation[J]. Journal of Electronics & Information Technology, 2006, 28(11): 2205-2208.
Citation: Zhang Hai-bo, Zhou Xian-wei, Song Cun-yi. Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation[J]. Journal of Electronics & Information Technology, 2006, 28(11): 2205-2208.

Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation

  • Received Date: 2005-04-07
  • Rev Recd Date: 2005-12-30
  • Publish Date: 2006-11-19
  • Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.
  • loading
  • [1] Deering S E, Cheriton D R. Host groups: A multicast extension to the Internet protocol. (RFC966), Dec,1985. [2] 赵膺,宋佳兴,徐万鸿,刘卫东. 安全组播综述[J]. 小型微型计算机系统,2003, 24(10): 1873-1877. [3] Hardjono T, Tsudik G. IP multicast security: Issues and directions. Annales de Telecom, July-August 2000: 324-340. [4] Gennaro R, Rohatgi P. How to sign digital streams[J].Information and Computation.2001,165(1):100-116 [5] Gennaro R, Rohatgi P. How to sign digital streams. Proceedings of the 17th Annual International Cryptology Conference, Advances in Cryptology - Crypto97, 17-21 August 1997, vol. 1294 of Lecture notes in computer science, Springer: 180-197. [6] Perrig A, Canetti R, Tygar J D, Song D. Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy, May, 2000: 56-73. [7] Miner S, Staddon J. Graph-based authentication of digital streams. IEEE Symposium on Security and Privacy, Oakland, California, USA, May, 2001: 232-246. Golle P, Modadugu N. Authenticating streamed data in the presence of random packet loss. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), the Internet Society, San Diego, USA, Feb, 2001: 13-22. [8] Wong C K, Lam S S. Digital signatures for flows and multicasts. in Progress of IEEE Internet Conference on Network Protocols, AICNP98, Austin, Texas, USA. Oct. 1998: 198-209. [9] Wong C K, Lam S S. Digital signatures for flows and multicasts[J].IEEE/ACM Transactions on Networking.1999, 7(4):502- [10] Park J M, Chong E K P, Siegel H J. Efficient multicast packet authentication using signature amortization. IEEE Symposium on Security and Privacy, Oakland, California, USA, May, 2002: 227-240. [11] Park J M, Chong E K P, Siegel H J. Efficient multicast stream authentication using erasure codes[J].ACM Transactions on Information and System Security.2003, 6(2):258-285 [12] Rabin M O. Efficient dispersal of information for security, loadbalancing, and fault tolerance. Journal of Association for Computing Machinery, 1989, 36(2): 335-348. [13] Even S, Goldreich O, Micali S. On-line/off-line digital signatures[J].Advances in CryptologyCRYPTO '89, Lecture Notes in Computer Science, (G. Brassard, ed.), Springer Verlag.1990, vol. 435:263-275 [14] Even S, Goldreich O, Micali S. On-line/off-line digital signatures[J].Journal of Cryptology.1996, 9(1):35-67
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2219) PDF downloads(810) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return