Multicast security: a taxonomy and some efficient constructions

作者: R. Canetti , J. Garay , G. Itkis , D. Micciancio , M. Naor

DOI: 10.1109/INFCOM.1999.751457

关键词:

摘要: … While MACs are typically much more efficient to generate and verify than digital signatures, … efficient than public key based authentication (especially in the time to generate signatures). …

参考文章(23)
R. Safavi-Naini, H. Wang, New results on multi-receiver authentication codes theory and application of cryptographic techniques. pp. 527- 541 ,(1998) , 10.1007/BFB0054151
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
Michael George Luby, None, Pseudorandomness and Cryptographic Applications ,(1996)
H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture RFC. ,vol. 2094, pp. 1- 22 ,(1997)
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
H. Krawczyk, SKEME: a versatile secure key exchange mechanism for Internet network and distributed system security symposium. pp. 114- 127 ,(1996) , 10.1109/NDSS.1996.492418
E. Harder, R. Agee, D. Wallner, Key Management for Multicast: Issues and Architectures RFC. ,vol. 2627, pp. 1- 23 ,(1999)
Rosario Gennaro, Pankaj Rohatgi, How to Sign Digital Streams Information & Computation. ,vol. 165, pp. 100- 116 ,(2001) , 10.1006/INCO.2000.2916
Martin Dyer, Trevor Fenner, Alan Frieze, Andrew Thomason, On key storage in secure networks Journal of Cryptology. ,vol. 8, pp. 189- 200 ,(1995) , 10.1007/BF00191355
Li Gong, N. Shacham, Elements of trusted multicasting Proceedings of ICNP - 1994 International Conference on Network Protocols. pp. 23- 30 ,(1994) , 10.1109/ICNP.1994.344380