2002
DOI: 10.1016/s0167-4048(02)00813-1
|View full text |Cite
|
Sign up to set email alerts
|

Individual Authentication in Multiparty Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…Its history can be traced back to Lamport's scheme which uses one-way chains to authenticate users over an insecure network [21]. The work of Bergadano et al [8] proposes several variants of one-way chain based protocols, with or without time synchronization. Previous work which inspired this family of protocols is the Guy Fawkes protocol from [2].…”
Section: A Related Work On Secure Broadcast Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Its history can be traced back to Lamport's scheme which uses one-way chains to authenticate users over an insecure network [21]. The work of Bergadano et al [8] proposes several variants of one-way chain based protocols, with or without time synchronization. Previous work which inspired this family of protocols is the Guy Fawkes protocol from [2].…”
Section: A Related Work On Secure Broadcast Protocolsmentioning
confidence: 99%
“…The security of this family of protocols is well established, formal proofs of security can be found in [8] and [31]. The informal argument is that from MAC K (M) and F(K ) an adversary cannot produce MAC K (M ′ ) for any M ′ = M since K is not known as well as it cannot be found from F(K ).…”
Section: Generic Description Of the Protocolmentioning
confidence: 99%
“…This kind of solutions is subject to collusions, where a set of fraudulent receivers collaborate to reconstruct a part of the whole key material used by the sender, in order to forge authentic messages on its behalf. Other solutions [1,2] [32,34,35] [26,33,40] suggest to use time as source of asymmetry. In other words, receivers are synchronized with the sender's clock and are instructed when to accept a specific key as being used to authenticate received messages.…”
Section: Introductionmentioning
confidence: 99%
“…The multicast source streams the three RLH layers: the basic data payload layer (layer L0), the medium redundant authentication layer (layer L1), and the highly redundant 2 We considered the maximal packet loss ratio strategy so that all receivers reach the target verification ratio We were interested in measuring the tree authentication information cost, which we define as follows:…”
Section: Simulation Resultsmentioning
confidence: 99%
“…This kind of solutions is subject to collusions, where a set of fraudulent receivers collaborate to reconstruct a part of the whole key material used by the sender, in order to forge authentic messages on its behalf. Other solutions [1,2] [29,31,32] [23,30,35] suggest to use time as source of asymmetry. In other words, receivers are synchronized with the sender's clock and are instructed when to accept a specific key as being used to authenticate received messages.…”
mentioning
confidence: 99%