Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Communications Technology》 2007-12
Add to Favorite Get Latest Update

Multicast Source Authentication Based on Hash Chain and Merkle Tree

ZHOU Hong①, JIANG Xing-hao①, YAO Yi-feng②, SUN Tan-feng① (①Information and Security Engineering School Shanghai JiaoTong University, Shanghai 200240, China; ②Alcatel Shanghai Bell Co., Ltd. , Shanghai 200240, China)  
In this paper, a new scheme which combines the advantages of Hash chaining and authenticating tree is proposed. A stream is split into blocks of the same size, and then some binary trees, chained by their digests, are constructed within the blocks. This scheme ensures the non-repudiation and can resist packet loss.
【Fund】: 国家自然科学基金项目资助(NO.60702042)
【CateGory Index】: TN919
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-references】
Chinese Journal Full-text Database 6 Hits
1 HE Jin-xina,b,OUYANG Ruo-chuana,XU Gao-chaoa(a.College of Computer Science and Technology,Jilin University,Changchun 130012,China;b.College of Earth Sciences,Jilin University,Changchun 130061,China);Source Authentication Approach to Real-Time Multicast Streams Based on Forward Hashing Chains[J];Journal of Jilin University(Information Science Edition);2007-05
2 GAO Chong-zhi~1,CAO Jia-li~2(1.School of Information and Mechanical Electronics Engineering,Guangzhou University,Guangzhou 510006,China;2.College of Applied Mathematics,Guangdong University of Technology,Guangzhou 510090,China);An efficient and loss-resistant authentication protocol for real time streams[J];Journal of Guangzhou University(Natural Science Edition);2006-03
3 XIAO Chang-shui,ZHAO Hui;Design and Realization of the Safe Transmission Scheme for the Secret Information Based on IDA[J];Sci-Tech Information Development & Economy;2007-11
4 ZHANG Ying1,2,3,YUE Dian-wu1,2 1.School of Information Science and Technology,Dalian Maritime University,Dalian,Liaoning 116026,China 2.National Mobile Communications Research Laboratory,Southeast University,Nanjing 210096,China 3.Department of Mathematics,Dalian Maritime University,Dalian,Liaoning 116026,China;Cryptanalysis of digital signature scheme based on error-correcting codes[J];Computer Engineering and Applications;2009-29
5 NIU Zhen-yu1, ZHOU Xian-wei1, YANG Jun2 (1. School of Information and Engineering,University of Science and Technology Beijing,Beijing,100083)(2. School of Civil & Environmental Engineering,University of Science and Technology Beijing,Beijing,100083);Analysis of Secure and Efficient One-Time Signature Scheme for Multicast Source Authentication[J];Microelectronics & Computer;2004-10
6 XIONG Ji-ping, ZHU Wen-tao, LI Jin-sheng, HONG Pei-lin, LIAO Xiao-fei (Department of Electronic Engineering and Information Science,University of Science and Technology of China,Hefei 230027,China);Multicast Source Authentication Scheme Based on Tornado Codes[J];Mini-micro Systems;2004-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved