Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

被引:49
|
作者
Wang, Qiyan [1 ]
Khurana, Himanshu [1 ]
Huang, Ying [1 ]
Nahrstedt, Klara [1 ]
机构
[1] Univ Illinois, Champaign, IL 61801 USA
关键词
D O I
10.1109/INFCOM.2009.5062037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is challenging to provide authentication to time-critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks. In this paper, we propose a novel signature model - Time Valid One-Time Signature (TV-OTS) - to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design an efficient multicast authentication scheme "TV-HORS" to meet the above needs. TV-HORS combines one-way hash chains with TV-OTS to avoid frequent public key distribution. It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the order of microseconds). In addition, TV-HORS has perfect tolerance to packet loss and strong robustness against malicious attacks. The communication overhead of TV-HORS is much smaller than regular OTS schemes, and even smaller than RSA signature. The only drawback of TV-HORS is a relatively large public key of size 8KB to 10KB, depending on parameters.
引用
收藏
页码:1233 / 1241
页数:9
相关论文
共 50 条
  • [31] AUTHENTICATION ENCRYPTION CRYPTOSYSTEM WITH DERIVED ONE-TIME KEYS
    Zubov, A. Yu
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (50): : 51 - 61
  • [32] A Cloud Authentication Protocol using One-Time Pad
    Sim, Lexus Jun Hong
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2513 - 2516
  • [33] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    Soft Computing, 2020, 24 : 5657 - 5670
  • [34] Cryptanalysis of a code-based one-time signature
    Deneuville, Jean-Christophe
    Gaborit, Philippe
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (09) : 1857 - 1866
  • [35] On one-time cookies protocol based on one-time password
    He, Junhui
    Han, Dezhi
    Li, Kuan-Ching
    SOFT COMPUTING, 2020, 24 (08) : 5657 - 5670
  • [36] Revocable One-Time Ring Signature from Pairings
    Han, Xu
    Zhang, Dawei
    Huang, Zongmin
    Yao, Shuang
    Wu, Zuodong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] One-time proxy signature based on quantum cryptography
    Tian-Yin Wang
    Zong-Li Wei
    Quantum Information Processing, 2012, 11 : 455 - 463
  • [38] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [39] Cryptanalysis of a code-based one-time signature
    Jean-Christophe Deneuville
    Philippe Gaborit
    Designs, Codes and Cryptography, 2020, 88 : 1857 - 1866
  • [40] One-time proxy signature based on quantum cryptography
    Wang, Tian-Yin
    Wei, Zong-Li
    QUANTUM INFORMATION PROCESSING, 2012, 11 (02) : 455 - 463