Efficient Provider Authentication for Bidirectional Broadcasting Service
Autor: | Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake |
---|---|
Rok vydání: | 2010 |
Předmět: |
Authentication
business.industry Computer science Applied Mathematics Key distribution Computer security computer.software_genre Computer Graphics and Computer-Aided Design Digital signature Derived unique key per transaction Signal Processing Key (cryptography) Static key Pre-shared key Electrical and Electronic Engineering business Key management computer Computer network |
Zdroj: | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1039-1051 |
ISSN: | 1745-1337 0916-8508 |
DOI: | 10.1587/transfun.e93.a.1039 |
Popis: | Provider authentication is necessary in bidirectional broadcasting services, and a digital signature scheme is often used to prevent an adversary from attempting impersonation. The cost of secure signing key management is extremely high. In addition, the key has to be updated very often, since it is frequently used. The result is that the verification key also has to be updated very often, and its redistribution cost is huge. These costs are real and substantive problems, especially when the number of users is large. In this paper, we propose a system that dramatically reduces these costs. In the system, the signing key is updated, but the corresponding verification key does not have to be updated. This means that the signing key can be updated without any cost for redistributing the verification key and that the system is secure against the threat of signing key leakage, since the key can be frequently updated. Moreover, we propose a new key management method that divides a conventional key management server's role into two. The use of a key-insulated signature (KIS) scheme enables low-cost and more secure key management with two servers. Finally, to make a bidirectional broadcasting service more secure even if the signing key is leaked, we developed a new strong KIS scheme. We performed an experiment that assessed the cost of our strong KIS scheme and found that it is sufficiently low. Accordingly, a provider authentication system employing this scheme would be more efficient and would have lower key redistribution and network costs in comparison with conventional authentication systems. |
Databáze: | OpenAIRE |
Externí odkaz: |