Title: Efficiency optimisation signature scheme for time-critical multicast data origin authentication

Authors: Yichuan Wang; Jianfeng Ma; Xiang Lu; Di Lu; Liumei Zhang

Addresses: Faculty of Computer Science and Engineering, Xi'an University of Technology, Xi'an 710048, China; School of Computer Science and Technology, Xidian University, Xi'an 710071, China ' School of Computer Science and Technology, Xidian University, Xi'an 710071, China ' Institute of Information Engineering, China Academy of Science, Beijing 100080, China ' School of Computer Science and Technology, Xidian University, Xi'an 710071, China ' School of Computer Science and Technology, Xidian University, Xi'an 710071, China

Abstract: A great challenge of providing authentication to time-critical multicast data is the existence of low end-to-end delay in many applications such as pay-TV and the power grid scenarios. Consequently, to balance security and efficiency is still a difficult issue. The group of secret keys reused scheme of TV-HORS still cannot meet the requirements of low time delay of computation. To describe the relationship between security and efficiency for the time-critical multicast communication scenarios, we present a Game Model of Multicast Data Origin Authentication, in this paper. By analysing our model with Shannon's information and game theory, we propose an optimised re-keying scheme, contraposing the TV-HORS scheme. The advantage of breaking the security goal is negligible, even in the lowest risk-level parameter. The experiment results show that our scheme does significantly promote the efficiency of TV-HORS scheme and is the most efficient multicast data origin authentication signature scheme.

Keywords: multicast data origin authentication; game theory; TV-HORS; network security; optimisation signature; time-critical multicast data; end-to-end delay; pay TV; power grid; re-keying.

DOI: 10.1504/IJGUC.2016.073771

International Journal of Grid and Utility Computing, 2016 Vol.7 No.1, pp.1 - 11

Available online: 18 Dec 2015 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article