Broadcast authentication for group communication

被引:15
作者
Safavi-Naini, R [1 ]
Wang, HX [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Wollongong, NSW 2522, Australia
关键词
authentication; multireceiver authentication code; broadcast authentication; key distribution pattern; perfect hash family; group communication;
D O I
10.1016/S0304-3975(00)00184-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional point-to-point message authentication systems have been extensively studied in the literature. In this paper, we consider authentication systems for group communication. The basic primitive is a multireceiver authentication system with dynamic senders (DMRA-code). In a DMRA-code any member of the group can broadcast an authenticated message to the rest of the group such that every other member of the group can individually verify the authenticity of the message. We give a flexible `synthesis' construction for DMRA-codes by combining an A-code and a key distribution pattern. tDMRA-codes extend this model when there are up to t senders. We give two constructions, one algebraic and one by `synthesis' of an A-code and a perfect hash family. We show universality of `synthesis' constructions for unconditional and computational models of security which means that our results have wider range applications. Finally, to demonstrate the usefulness of DMRA model, we modify a secure dynamic conference-key distribution system to construct a secure dynamic conference system that provides secrecy and authenticity of communication among conferencees. The system is key-efficient as its key requirement remains nearly the same as the original conference key distribution system and so authentication is effectively obtained without any extra cost. We discuss possible extensions to this work. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 32 条
[1]   Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions [J].
Alon, N ;
Naor, M .
ALGORITHMICA, 1996, 16 (4-5) :434-449
[2]  
Atici M, 1996, J COMB DES, V4, P353
[3]  
Bellare M, 1996, LNCS, V1109, P1
[4]   Universal Hashing and Geometric Codes [J].
Bierbrauer J. .
Designs, Codes and Cryptography, 1997, 11 (3) :207-221
[5]   Optimal linear perfect hash families [J].
Blackburn, SR ;
Wild, PR .
JOURNAL OF COMBINATORIAL THEORY SERIES A, 1998, 83 (02) :233-250
[6]  
Blackburn SR, 1996, LECT NOTES COMPUT SC, V1070, P107
[7]  
BLACKBURN SR, 1997, RES NOTES MATH, V403, P49
[8]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[9]  
Blundo C., 1993, LNCS, V740, P471
[10]   Perfect hashing [J].
Czech, ZJ ;
Havas, G ;
Majewski, BS .
THEORETICAL COMPUTER SCIENCE, 1997, 182 (1-2) :1-143