Efficient Multicast Authentication Batch Signature

Multicast (1) is defined as sending data from a single sender to a group of receivers. While multicasting the data, it should be provided with security services. Generally, security services are classified into five areas namely data integrity, data origin, authentication (2), non-repudiation and confidentiality. This project work supports the first three security services, which are implemented using a cryptographic technique called batch signature (3). Designing a batch signature protocol is quite difficult and hence certain issues have to be considered, which include efficiency, packet loss, computation latency and communication overhead. In internet, normally congestion is sure to happen at certain period which results in packet loss (4) have to be reduced. For applications like online streaming, video conferencing and online games, the quality of services is low to the end users. Therefore, MABS protocol should provide a certain level of packet loss recovery. In this paper, we have proposed two schemes namely, basic scheme and enhanced scheme. The basic scheme normally supports three algorithms namely batch RSA algorithm (5), batch BLS algorithm (6) and our batch DSA algorithm (7, 8), in which these algorithms mainly involves to address efficiency and packet loss problems in network environment (9). Enhanced scheme combines basic scheme and merkle tree generation (10) (packet filtering technique) which completely eliminates the forged packets in order to overcome the DOS (Denial of Service) attack. Hence, our comparison study predicts that MABS-E is less efficient than MABS-B due to DOS defense. In our new approach, mod-inversion operation is one of the most important factors which influence the computation time of digital signature and verification, thus improvements to this point has been proposed by implementing new approach called PDSA.

[1]  Ali Mahlooji Far,et al.  Retinal Image Analysis Using Curvelet Transform and Multistructure Elements Morphology by Reconstruction , 2011, IEEE Transactions on Biomedical Engineering.

[2]  Asadullah Shah,et al.  Measuring Efficiency of Tier Level Data Centers to Implement Green Energy Efficient Data Centers , 2013 .

[3]  Ali Abbasi,et al.  Comparing the Static and Dynamic Balances and Their Relationship with the Anthropometrical Characteristics in the Athletes of Selected Sports , 2013 .

[4]  Sibghatullah Nasir,et al.  Microfinance in India: Contemporary Issues and Challenges , 2013 .

[5]  David M'Raïhi,et al.  Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard , 1994, EUROCRYPT.

[6]  Chae Hoon Lim,et al.  Security of interactive DSA batch verification , 1994 .

[7]  Lein Harn,et al.  Batch verifying multiple RSA digital signatures , 1998 .

[8]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Roberto Tamassia,et al.  Multicast authentication in fully adversarial networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[11]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[12]  V. Khanaa,et al.  An Integrated Agent System for E-mail Coordination using Jade , 2013 .

[13]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[14]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[15]  Jessica Staddon,et al.  Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Yuguang Fang,et al.  Multicast Authentication over Lossy Channels , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[18]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[19]  Stephen E. Deering,et al.  Multicast routing in internetworks and extended LANs , 1988, SIGCOMM '88.

[20]  Shi Cui,et al.  An efficient identity-based signature scheme with batch verifications , 2006, InfoScale '06.

[21]  Dan Boneh,et al.  Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.

[22]  Mihir Bellare,et al.  Fast Batch Verification for Modular Exponentiation and Digital Signatures , 1998, IACR Cryptol. ePrint Arch..