A graph-theoretical analysis of multicast authentication

  • Authors:
  • Aldar C-F. Chan

  • Affiliations:
  • -

  • Venue:
  • ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Message authentication is considered as a serious bottleneckto multicast security, particular for stream-type oftraffic. The technique of hash chaining/signature amortizationhas been proposed in many schemes for streamauthentication, with or without multicast settings. However,none of them is optimal. They either have a largepacket overhead or are not robust to packet loss. Someeven have a large receiver delay or require a large receiverbuffer size. These schemes are constructed by trial-and-errormethods. There lack tools to evaluate and comparetheir performances. There is no systematic way to constructthese schemes either. In this paper, we introduce the notionof dependence-graphs which links these hash-chained authenticationschemes to the well-known graph theory, andprovides an effective analytical tool. Many important metricsof a hash-chained authentication scheme can be readilyand easily determined from its dependence-graph. As well,a dependence-graph demonstrates design tradeoff and providesinsights into optimizing hash-chained schemes.