Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Authenticated error-correcting codes with applications to multicast authentication

Published: 05 March 2010 Publication History

Abstract

We consider the problem of authenticating a stream of packets transmitted over a network controlled by an adversary who may perform arbitrary attacks on the stream: He may drop or modify chosen packets, rearrange the order of the packets in any way, and inject new, random, or specially crafted packets into the stream. In contrast, prior work on the multicast authentication problem has focused on a less powerful adversarial network model or has examined a considerably more restrictive setting with specific timing or structural assumptions about the network.
We model the ability of the network to modify a stream of n packets with two parameters: the survival rate α (0 <α≤ 1) denoting the fraction of the packets that are guaranteed to reach any particular receiver unmodified and the flood rate β (β ≥ 1) indicating the factor by which the size of the received stream at any particular receiver may exceed the size of the transmitted stream. Combining error-correcting codes with standard cryptographic primitives, our approach gives almost the same security guarantees as if each packet were individually signed, but requires only one signature operation for the entire stream and adds to each transmitted packet only a small amount of authentication information, proportional to β/α2. We prove the security and correctness of our scheme and analyze its performance in terms of communication overhead and computational effort at the sender and the receiver. Our results demonstrate how list decoding can be transformed into unambiguous decoding in the public-key model and the bounded computational model for the underlying communication channel. Overall, our technique provides an authenticated error-correcting code of independent interest that may be useful in other settings.

References

[1]
Boneh, D., Durfee, G., and Franklin, M. 2001. Lower bounds for multicast message authentication. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'01). Springer, Berlin, 437--452.
[2]
Boneh, D. and Franklin, M. 2003. Identity-based encryption from the Weil pairing. SIAM J. Comput. 32, 3, 586--615.
[3]
Boneh, D., Lynn, B., and Shacham, H. 2001. Short signatures from the Weil pairing. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT'01). Springer, Berlin, 514--532.
[4]
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., and Pinkas, B. 1999. Multicast security: A taxonomy and some efficient constructions. In Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM'99). IEEE, Los Alamitos, CA, 708--716.
[5]
Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. 2001. Introduction to Algorithms. MIT Press, Cambridge, MA.
[6]
Cramer, R. and Shoup, V. 2000. Signature schemes based on the strong RSA assumption. ACM Trans. Inf. Syst. Secur. 3, 3, 161--185.
[7]
Desmedt, Y., Frankel, Y., and Yung, M. 1992. Multi-receiver/multi-sender network security: Efficient authenticated multicast/feedback. In Proceedings of the 20th IEEE International Conference on Computer Communications (INFOCOM'92). IEEE, Los Alamitos, CA, 2045--2054.
[8]
Fischlin, M. 2003. The Cramer-Shoup strong-RSA signature scheme revisited. In Proceedings of the International Conference on Practice and Theory in Public Key Cryptography. Springer, Berlin, 116--129.
[9]
Gennaro, R. and Rohatgi, P. 1997. How to sign digital streams. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO'97). Springer, Berlin, 180--197.
[10]
Goldberg, I. 2007. Improving the robustness of private information retrieval. In Proceedings of the Symposium on Security &amp; Privacy. IEEE, Los Alamitos, CA, 131--148.
[11]
Goldreich, O. 2004. Foundations of Cryptography, vol II. Cambridge University Press, Cambridge, MA.
[12]
Goldreich, O., Rubinfeld, R., and Sudan, M. 2000. Learning polynomials with queries: The highly noisy case. SIAM J. Disc. Math. 13, 4, 535--570.
[13]
Goldwasser, S., Micali, S., and Rivest, R. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281--308.
[14]
Golle, P. and Modadugu, N. 2001. Authenticating streamed data in the presence of random packet loss. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, Reston, VA, 13--22.
[15]
Gunter, C., Khanna, S., Tan, K., and Venkatesh, S. 2004. DoS protection for reliably authenticated broadcast. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, Reston, VA, 17--36.
[16]
Guruswami, V. 2001. List decoding of error-correcting codes. Ph.D. thesis, Massachusetts Institute of Technology, Boston, MA.
[17]
Guruswami, V. and Sudan, M. 1999. Improved decoding of Reed-Solomon and algebraic geometric codes. IEEE Trans. Inf. Theory 45, 1757--1767.
[18]
Karlof, C., Sastry, N., Li, Y., Perrig, A., and Tygar, J. 2004. Distillation codes &amp; applications to DoS resistant multicast authentication. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, Reston, VA, 37--56.
[19]
Krawczyk, H. 1993. Distributed fingerprints and secure information dispersal. In Proceedings of the Symposium on Principles of Distributed Computing. ACM, New York, 207--218.
[20]
Krohn, M., Freedman, M., and Mazieres, D. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of the Symposium on Security &amp; Privacy. IEEE, Los Alamitos, CA, 226--240.
[21]
Luby, M. G., Mitzenmacher, M., Shokrollahi, M. A., and Spielman, D. A. 2001. Efficient erasure correcting codes. IEEE Trans. Inf. Theory 47, 2, 569--584.
[22]
Lysyanskaya, A., Tamassia, R., and Triandopoulos, N. 2004. Multicast authentication in fully adversarial networks. In Proceedings of the Symposium on Security &amp; Privacy. IEEE, Los Alamitos, CA, 241--255.
[23]
McEliece, R. J. 2003. The Guruswami-Sudan decoding algorithm for Reed-Solomon codes. Tech. rep. JPL Interplanetary Network Progress Report, IPN PR 42--153.
[24]
Micali, S., Peikert, C., Sudan, M., and Wilson, D. A. 2005. Optimal error correction against computationally bounded noise. In Proceedings of the Theory of Cryptology Conference (CRYPTO'05). Springer, Berlin, 1--16.
[25]
Miner, S. and Staddon, J. 2001. Graph-based authentication of digital streams. In Proceedings of the Symposium on Security &amp; Privacy. IEEE, Los Alamitos, CA, 232--246.
[26]
Pannetrat, A. and Molva, R. 2003. Efficient multicast packet authentication. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, Reston, VA.
[27]
Park, J. M., Chong, E. K. P., and Siegel, H. J. 2003. Efficient multicast packet authentication using erasure codes. ACM Trans. Inf. Syst. Secur. 6, 2, 258--285.
[28]
Perrig, A. 2001. The BiBa one-time signature and broadcast authentication protocol. In Proceedings of the Conference on Computing and Communication Security. ACM, New York, 28--37.
[29]
Perrig, A., Canetti, R., Song, D., and Tygar, J. 2001. Efficient and secure source authentication for multicast. In Proceedings of the Network and Distributed System Security Symposium. Internet Society, Reston, VA, 35--46.
[30]
Perrig, A., Canetti, R., Tygar, J., and Song, D. 2000. Efficient authentication and signing of multicast stream over lossy channels. In Proceedings of the Symposium on Security &amp; Privacy. IEEE, Los Alamitos, CA, 56--73.
[31]
Rabin, M. O. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36, 2, 335--348.
[32]
Reed, I. S. and Solomon, G. 1960. Polynomial codes over certain finite fields. SIAM J. Appl. Math. 8, 2, 300--304.
[33]
Rohatgi, P. 1999. A compact and fast hybrid signature scheme for multicast packet authentication. In Proceedings of the Conference on Computing and Communication Security. ACM, New York, 93--100.
[34]
Simmons, G. J. 1984. Authentication theory/coding theory. In Proceedings of the Theory of Cryptology Conference (CRYPTO'84). Springer, Berlin, 411--431.
[35]
Song, D., Zuckerman, D., and Tygar, J. D. 2002. Expander graphs for digital stream authentication and robust overlay networks. In Proceedings of the Symposium on Security and Privacy. IEEE, Los Alamitos, CA, 258--270.
[36]
Welch, L. and Berlekamp, E. 1986. Error correction of algebraic block codes. U.S. Patent Number 4,633,470, issued December 1986.
[37]
Wong, C. K. and Lam, S. S. 1999. Digital signatures for flows and multicasts. IEEE/ACM Trans. Networking 7, 4, 502--513.
[38]
Xu, S. and Sandhu, R. 2002. Authenticated multicast immune to denial-of-service attack. In Proceedings of the Symposium on Applied Computing. ACM, New York, 196--200.

Cited By

View all
  • (2013)The Adaptive Multicast Data Origin Authentication ProtocolFrontiers in Internet Technologies10.1007/978-3-642-53959-6_11(109-121)Online publication date: 2013
  • (2012)A Trapdoor Hash-Based Mechanism for Stream AuthenticationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2012.489:5(699-713)Online publication date: 1-Sep-2012
  • (2011)Challenging the feasibility of authentication mechanisms for P2P live streamingProceedings of the 6th Latin America Networking Conference10.1145/2078216.2078227(55-63)Online publication date: 12-Oct-2011
  • Show More Cited By

Index Terms

  1. Authenticated error-correcting codes with applications to multicast authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Information and System Security
    ACM Transactions on Information and System Security  Volume 13, Issue 2
    February 2010
    230 pages
    ISSN:1094-9224
    EISSN:1557-7406
    DOI:10.1145/1698750
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 March 2010
    Accepted: 01 July 2009
    Revised: 01 February 2009
    Received: 01 April 2006
    Published in TISSEC Volume 13, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. data stream
    3. digital signature schemes
    4. error-correcting codes
    5. information integrity
    6. list decoding
    7. multicast security

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 10 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)The Adaptive Multicast Data Origin Authentication ProtocolFrontiers in Internet Technologies10.1007/978-3-642-53959-6_11(109-121)Online publication date: 2013
    • (2012)A Trapdoor Hash-Based Mechanism for Stream AuthenticationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2012.489:5(699-713)Online publication date: 1-Sep-2012
    • (2011)Challenging the feasibility of authentication mechanisms for P2P live streamingProceedings of the 6th Latin America Networking Conference10.1145/2078216.2078227(55-63)Online publication date: 12-Oct-2011
    • (2011)Authentication of Digital StreamsIEEE Transactions on Information Theory10.1109/TIT.2011.216196057:9(6285-6303)Online publication date: 1-Sep-2011

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media