Broadcast Authentication With Hashed Random Preloaded Subsets

نویسنده

  • Mahalingam Ramkumar
چکیده

We introduce a novel cryptographic paradigm of broadcast authentication with “preferred” verifiers (BAP). With BAP, the message source explicitly targets a set of one or more verifiers. For an attacker, forging authentication data of a source, for purposes of fooling preferred verifiers may be substantially more difficult than fooling other (non-preferred) verifiers. We investigate broadcast authentication (BA) with hashed random preloaded subsets (HARPS), which caters for such a distinction. HARPS, provides for efficient broadcast authentication, with and without preferred verifiers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Broadcast Authentication With Preferred Verifiers

We introduce a novel cryptographic paradigm of broadcast authentication with “preferred” verifiers (BAP). With BAP, the message source explicitly targets a set of one or more verifiers. For an attacker, forging authentication data of a source, for purposes of fooling preferred verifiers may be substantially more difficult than fooling other (non-preferred) verifiers. We investigate broadcast au...

متن کامل

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verifi...

متن کامل

Low Latency and Congestion Broadcast Authentication in Fixed Topology Networks

We present several latency optimizations on two classes of broadcast authentication schemes for networks where the topology and the identities of the receiving nodes are known a-priori. Let n be the number of receivers in the network. The first class of protocols involves the construction and dissemination of a hash tree with message authentication codes (MACs) at the leaves. We show that this ...

متن کامل

Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks

The nature of Mobile Ad hoc NETworks (MANET), demands stringent requirements on primitives that could be used to secure such networks. Mobility imposes restrictions on memory and processor requirements due to limited battery life. The ad hoc nature warrants schemes that could operate for extended periods without referring to a Trusted Authority (TA). Additionally, any enabling scheme for securi...

متن کامل

A Network Authentication Protocol Based on Kerberos

We will focus on cryptographic protocols intended to achieve authentication over the networks. We aim to design a user authentication protocol that is not susceptible to password guessing attacks. We will present an authentication protocol based on the widely deployed Kerberos protocol with a little modification in the Kerberos database. The proposed protocol will be independent of the user pas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005