CFP last date
20 May 2024
Reseach Article

HTSS: Hash Tree Signature Scheme for Multicast Authentication

Published on April 2012 by Kannan Balasubramanian, R. Roopa Anbu Malar
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 6
April 2012
Authors: Kannan Balasubramanian, R. Roopa Anbu Malar
b03f06ec-084d-4f14-aab9-a4db6992ceaa

Kannan Balasubramanian, R. Roopa Anbu Malar . HTSS: Hash Tree Signature Scheme for Multicast Authentication. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 6 (April 2012), 28-32.

@article{
author = { Kannan Balasubramanian, R. Roopa Anbu Malar },
title = { HTSS: Hash Tree Signature Scheme for Multicast Authentication },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 6 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 28-32 },
numpages = 5,
url = { /proceedings/icon3c/number6/6045-1046/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A Kannan Balasubramanian
%A R. Roopa Anbu Malar
%T HTSS: Hash Tree Signature Scheme for Multicast Authentication
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%V ICON3C
%N 6
%P 28-32
%D 2012
%I International Journal of Computer Applications
Abstract

Many issues concern with secure multicasting are confidentiality, authentication, non-repudiation and data integrity including access control. Group-oriented applications such as video-conferencing, broadcasting stock quotes, software distribution or audio/video transmission are made possible through multicasting as an efficient communication mechanism. The deployment of these kinds of efficient communication mechanism is hindered because of lack of security. These limitations kindle the research minds to contribute towards secure multicasting. Hash Tree Signature Scheme (HTSS) is a newly proposed mechanism for multicast authentication that aims at providing packet authentication along with data integrity, non-repudiation and protection against key exposure. The scheme follows asymmetric cryptographic approach using tree-chaining technique that implements the tree construction for key generation and signature amortization for secure packet transmission. Performance evaluation is based on signing rate, providing non-repudiation and protection against key exposure. The HTSS is proposed in four different modes and its compatibility with the different issues in multicasting is discussed. The different modes discussed are sign-each, fixed delay, continuous and dynamic mode

References
  1. Diana Berbecaru, Luca Albertalli, and Antonio Lioy, "The Forward DiffSig Scheme for Multicast Authentication," in IEEE/ACM transaction on networking, Vol 18, No. 6, December 2010.
  2. Yun Zhou, Xiaoyan Zhu, and Yuguang Fang, "MABS : Multicast Authentication Based on Batch Signature," in IEEE transactions on Mobile Computing, Vol. 9, No. 7, July 2010.
  3. A. Perrig, R. Canetti, D. Song, and J. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, 2001, pp. 35–46.
  4. A. Perrig, D. Song, R. Canetti, J. D. Tygar, and B. Briscoe, "Timed efficient stream loss-tolerant authentication (TESLA): Multicast source authentication transform introduction," RFC 4082, June 2005.
  5. C. K. Wong and S. S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Trans. Netw. , vol. 7, no. 4, pp. 502–513, Aug. 1999.
  6. N. Kang and C. Ruland, "DiffSig: Differentiated digital signature for real-time multicast packet flows," in Proc. Trust Privacy Digital Business, 2004, LNCS 3184, pp. 251–260.
  7. A. Perrig, J. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Security Privacy, 2000, pp. 56–63.
  8. P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss," in Proc. NDSS, 2001, pp. 13–22.
  9. S. Miner and J. Staddon, "Graph-based authentication of digital streams," in Proc. IEEE Security Privacy, 2001, pp. 232–246.
  10. R. Gennaro and P. Rohatgi, "How to sign digital streams," in Proc. Crypto, 1997, LNCS 1294, pp. 180–197.
  11. A. Pannetrat and R. Molva, "Efficient multicast packet authentication," in Proc. NDSS, 2003.
  12. J. M. Park, E. Chong, and H. Siegel, "Efficient multicast packet authentication using signature amortization," in Proc. IEEE Security Privacy, 2002, pp. 227–240.
  13. M. Bellare and S. Miner, "A forward-secure digital signature scheme," in Proc. Crypto, 1999, LNCS 1666, pp. 431–448.
  14. G. Itkis and L. Reyzin, "Forward-secure signatures with optimal signing and verifying," in Proc. Crypto, 2001, LNCS 2139, pp. 332–354.
  15. M. Szydlo, "Merkle tree traversal in log space and time," 2003 [Online]. Available: http : / / www. szydlo. com / logspacetime03. pdf, preprint version.
  16. B. Weis, "The use of RSA/SHA-1 signatures within encapsulating security payload (ESP) and authentication header (AH)," RFC 4359, Jan. 2006.
  17. M. Yajnik, J. Kurose, and D. Towsley, "Packet loss correlation in the Mbone multicast network," IEEE Global Internet Conference, Nov. 1996.
  18. A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
  19. R. Merkle, Secrecy, Authentication and Public Key Systems. Ann Arbor, MI: UMI Research Press, 1982, also appears as a Stratford University Ph. D. dissertation in 1979.
  20. Secure Hash Standard (SHS), NIST FIPS 180-2, 2004
Index Terms

Computer Science
Information Sciences

Keywords

Forward Security Hash-tree Multicast Authentication Network Security Signature Amortization