Loss-tolerant confidential efficient authenticated broadcast scheme

H. Nasiraee, J. B. Mohasefi
{"title":"Loss-tolerant confidential efficient authenticated broadcast scheme","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ICCKE.2014.6993363","DOIUrl":null,"url":null,"abstract":"In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2014.6993363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.
容错保密高效认证广播方案
在对称密码学中,TESLA变体是公认的安全高效的有价值的源认证广播方案。但与非对称方式相比,特斯拉不提供保密性和即时认证,需要各方同步,由于同步而不灵活,最终存在延迟验证和溢出问题。在本文中,我们提出了一种新的安全广播协议,它像TESLA变体一样简单、安全、高效,以克服TESLA变体的不足。该方法提供机密性,并具有即时和非即时身份验证模式。它本质上是容错的,是目前所知的第一个在有损信道上只使用对称密钥的容错保密认证广播方案。通过进行真实世界场景实验,我们证明了该建议即使在资源受限的网络上也是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信