{"title":"Loss-tolerant confidential efficient authenticated broadcast scheme","authors":"H. Nasiraee, J. B. Mohasefi","doi":"10.1109/ICCKE.2014.6993363","DOIUrl":null,"url":null,"abstract":"In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.","PeriodicalId":152540,"journal":{"name":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 4th International Conference on Computer and Knowledge Engineering (ICCKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCKE.2014.6993363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.