1999
DOI: 10.1007/978-3-540-48000-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast Authentication in Group Communication

Abstract: Abstract. Traditional point-to-point message authentication systems have been extensively studied in the literature. In this paper we consider authentication for group communication. The basic primitive is a multireceiver authentication system with dynamic sender (DMRA-code). In a DMRA-code any member of a group can broadcast an authenticated message such that all other group members can individually verify its authenticity. In this paper first we give a new and flexible 'synthesis' construction for DMRA-codes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2000
2000
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Optimal construction of DMRA in terms of memory sizes for both a user's secret information and an authenticated message is an interesting open problem. We further point out that schemes in [14] and [9] are optimal only for memory sizes for an authenticated message.…”
Section: Methods To Fix the Problemmentioning
confidence: 92%
See 1 more Smart Citation
“…Optimal construction of DMRA in terms of memory sizes for both a user's secret information and an authenticated message is an interesting open problem. We further point out that schemes in [14] and [9] are optimal only for memory sizes for an authenticated message.…”
Section: Methods To Fix the Problemmentioning
confidence: 92%
“…Earlier MRA schemes required the sender himself to be designated. In order to ease the requirement of the designated sender, several variations of MRA with dynamic sender or DMRA have been proposed [13,14,15]. Among these schemes, we especially looked into Safavi-Naini and Wang's DMRA [13,15] which we thought has an interesting construction.…”
Section: Related Workmentioning
confidence: 99%
“…However, ABA is constructed based on (computationally secure) symmetric-key cryptography, and its model and security formalization is not given in the information-theoretic security setting. In addition, there are several schemes targeting one-to-many or many-to-many authenticated communications [24][25][26][27][28], however, those work is quite different from the MDRA-codes with information theoretic security.…”
Section: Related Workmentioning
confidence: 99%
“…Broadcast authentication [10,36,37,40,42,45] aims to broadcast a single piece of data to many receivers with data authenticity. However, with the exception of Watanabe et al's work [50], the existing works do not support the functionality that a sender chooses an arbitrary subset of receivers; data is always broadcast to all receivers.…”
Section: Related Workmentioning
confidence: 99%