Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
- 1 January 1992
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 2045-2054 vol.3
- https://doi.org/10.1109/infcom.1992.263476
Abstract
The authors extend the use of traditional point-to-point message authentication to multireceiver and/or multisender scenarios. They provide efficient cryptographic authentication methods for point-to-multipoint communication, where a single sender can broadcast (multicast) only one unconditionally secure authenticator for a message and which all receivers can verify. They further develop multipoint-to-point communication (incast) in which any subset (of a specified size) of a group of individuals can transmit a single authenticator (or a signature) for a message using the group's key. This method has been called threshold authentication. It is an application layer that is transparent to the receiver which only deals with the group as one entity. The bandwidth, computations, and storage overheads are reduced substantially when compared with the traditional approach. Threshold authentication hides some aspects of the internal structure of the group, which may be important in interenterprise communication.Keywords
This publication has 14 references indexed in Scilit:
- Universal one-way hash functions and their cryptographic applicationsPublished by Association for Computing Machinery (ACM) ,1989
- A survey of information authenticationProceedings of the IEEE, 1988
- Geometry and CodesPublished by Springer Nature ,1988
- Distributed network protocolsIEEE Transactions on Information Theory, 1983
- How to share a secretCommunications of the ACM, 1979
- Rivest-Shamir-Adleman public key cryptosystems do not always conceal messagesComputers & Mathematics with Applications, 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- SECURITY OF NUMBER THEORETIC PUBLIC KEY CRYPTOSYSTEMS AGAINST RANDOM ATTACK, ICryptologia, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949