Efficient DoS Resistant Multicast Authentication Schemes

To enable widespread commercial stream services, authentication is an important and challenging problem. As for multicast authentication, recently proposed schemes well-operate in adversarial network environment where an enemy can inject a large amount of invalid packets to choke the decoding process in the receivers, at the expense of a large communication overhead. In this paper, we present two efficient DoS resistant multicast authentication algorithms. To detect DoS attack, they require loose time-syncronization or delay of sending the packets, respectively. Compared with the previous schemes, they have much lower communication overhead and smaller computation cost on the receivers.

[1]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[2]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[3]  Ueli Maurer,et al.  Optimal Tree-Based One-Time Digital Signature Schemes , 1996, STACS.

[4]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[5]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[6]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[7]  Pankaj Rohatgi,et al.  A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.

[8]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[11]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[12]  Adrian Perrig,et al.  Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.

[13]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[14]  Carl Pomerance,et al.  Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[17]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[18]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .