期刊文献+

一个组播源认证方案的安全分析 被引量:3

Security Analysis on a Multicast Source Authentication Scheme
在线阅读 下载PDF
导出
摘要 组播源认证是组播通信中的一个研究热点。对一个基于不可靠通信信道的组播源认证方案进行了安全分析,给出了通过选择性地截留部分通信数据包,成功伪造了一个新的流签名的攻击方法。基于Chernoff界,讨论并给出了对原方案的参数设置的改进和限制,从而提高了方案的安全性,避免选择性截留攻击。 Multicast source authentication is one of the main challenges of securing multicast commtmication. The non-repudiation multicast source authentication scheme proposed by Li and Huai is claimed to be very efficient and robust to packet loss. However, with selectively intercepting and discarding of some packets, the paper shows that this scheme is vulnerable to forgery attacks. Based on Chernoff bound, the attack can be defeated by careful selection of security parameters of the scheme.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第18期12-13,22,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60025205 90304007 60373048)
关键词 组播 源认证 选择性截留攻击 Multicast Source authentication Selective interception attack
  • 相关文献

参考文献6

  • 1Gennaro R,Rohatgi P.How to Sign Digital Streams[M].Berlin:Springer-Verlag,1997:180-197.
  • 2Canneti R.Garay J,Itkis G,et al.Multicast Security:A Taxonomy and Some Efficient Construction[C].Proceedings of the 6th ACM Computer and Communications Security Conference,1999:93-100.
  • 3Golle P,Modadugu N.Authenticating Streamed Data in the Presence of Random Packet Loss[C].ISOC Network and Distributed System Security Symposium,2001:13-22.
  • 4李先贤,怀进鹏.高效的动态组播群通信认证签字方案[J].软件学报,2001,12(10):1486-1494. 被引量:3
  • 5Bellare M,Rogaway P.Random Oracles Are Practical:A Paradigm for Designing Efficient Protocols[C].Proceedings of the 1st Conference on Computer and Communications Security,1992:62-73.
  • 6Goldreich O.Foundations of Cryptography:Basic Tools[M].Cambridge University Press,2001.

二级参考文献1

  • 1吴世忠(译),应用密码学:协议、算法与C源程序,2000年

共引文献2

同被引文献24

  • 1陈晓林,杨昌,陆桑璐,陈贵海,谢立.一个主动组播路由协议的设计与实现[J].计算机工程与应用,2004,40(29):76-77. 被引量:6
  • 2姚烨,徐学洲,李孝安.一种基于Internet的组多播通信协议[J].计算机工程,2005,31(1):130-132. 被引量:5
  • 3Merkle R C. A Certified Digital Signature[C]//Proc. on Advances in Cryptology. New York, USA: Springer-Verlag, 1989:218-238.
  • 4Tian Ruixiong, Zhang Qian. Robust and Efficient Path Diversity in Application Layer Multicast for Video Streaming[J]. IEEE Transactions in Circuits and Systems for Video Technology, 2005, 15(8): 961-972.
  • 5Rivest R L, Shamir A, Adleman A L. A Method for Obtaining Digital Signature and Public-key Crypto System[J]. Communications of the ACM, 1978, 21(2): 120-126.
  • 6TIAN Rui-xiong,ZHANG Qian.Robust and efficient path diversity in application layer multicast for video streaming[J].IEEE Transactions in Circuits and Systems for Video Technology,2005,15(8):961-972.
  • 7Merkle R C.A Certified Digital Signature.Advances in Cryptology-Crypto[J].Berlin:Soringer-Verlag,LNCS 435,1989:218-238.
  • 8周贤伟,戴昕昱,刘蕴络.IP组播源认证方案研究[J].计算机工程,2007,33(16):130-132. 被引量:1
  • 9李磊,王怀民,史殿习.一种高性能的全序组播算法[J].计算机研究与发展,2007,44(9):1449-1455. 被引量:1
  • 10Canneti R. Garay. J., Itkis G., et al. Multicast security: a taxonomy and some efficient construction[ A ]. In Proceedings of the 6^th ACM Computer and Communications Security Conference[C]. Singapore:ACM Press, 1999.93 - 100.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部