Skip to main navigation Skip to search Skip to main content

Multicast authentication over lossy channels

Yun Zhou, Yuguang Fang

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

Abstract

Authentication is critical to ensure the origin of a multicast stream. To avoid computationally expensive signature, operations on each packet, conventional schemes divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash chains or codes. However, most of them suffer from drawbacks such as vulnerability to packet loss and authentication latency at the sender and/or receivers. Unlike the block-based approach, we develop a novel Multicast Authentication scheme based on Batch Signature (MABS). In particular, each packet is attached with a signature, and a receiver authenticates any number of packets simultaneously by verifying their signatures through only one verification operation. We propose three implementations of MABS including two new batch signature schemes based on BLS and DSA and show they are more efficient than the batch RSA signature scheme. MABS is perfectly resilient to packet loss and completely eliminate the authentication latency at the sender and receivers. © 2007 IEEE.
Original languageEnglish
Title of host publicationMilitary Communications Conference, MILCOM 2007
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventMilitary Communications Conference, MILCOM 2007 - Orlando, FL, United States
Duration: 29 Oct 200731 Oct 2007

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

ConferenceMilitary Communications Conference, MILCOM 2007
PlaceUnited States
CityOrlando, FL
Period29/10/0731/10/07

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'Multicast authentication over lossy channels'. Together they form a unique fingerprint.

Cite this