{"title":"组播数据源认证研究综述","authors":"Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang","doi":"10.1109/ICCT.2008.4716234","DOIUrl":null,"url":null,"abstract":"Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin authenticationpsila. This paper introduces the main schemes for authenticating multicast data origin, and evaluates their performances with computation overhead, communication overhead and some other parameters. The result shows there are no ideal solutions to satisfy all multicast applications.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"15 12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Survey on multicast data origin authentication\",\"authors\":\"Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang\",\"doi\":\"10.1109/ICCT.2008.4716234\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin authenticationpsila. This paper introduces the main schemes for authenticating multicast data origin, and evaluates their performances with computation overhead, communication overhead and some other parameters. The result shows there are no ideal solutions to satisfy all multicast applications.\",\"PeriodicalId\":259577,\"journal\":{\"name\":\"2008 11th IEEE International Conference on Communication Technology\",\"volume\":\"15 12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 11th IEEE International Conference on Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2008.4716234\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 11th IEEE International Conference on Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2008.4716234","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin authenticationpsila. This paper introduces the main schemes for authenticating multicast data origin, and evaluates their performances with computation overhead, communication overhead and some other parameters. The result shows there are no ideal solutions to satisfy all multicast applications.