The Community for Technology Leaders
2012 23rd International Workshop on Database and Expert Systems Applications (2003)
Prague, Czech Republic
Sept. 1, 2003 to Sept. 5, 2003
ISSN: 1529-4188
ISBN: 0-7695-1993-8
pp: 455
Atul Prakash , University of Michigan
Xin Zhao , University of Michigan
Many group communication systems need to enforce a restriction that limits members are authorized to send messages to the group. Receivers therefore need to authenticate message sources before the received messages are accepted. Source authentication in peer-to-peer systems is trivial: the two communication parties can agree on one pair key and use this key to authenticate each other. However, because the group key is shared by all members in a group system, it is quite challenging to identify the sender and determine its authorization. Furthermore, if the authorization can be changed at run-time, source authentication problem can be even harder. This paper presents a source authentication technique called TTA scheme(Transitive Trust Authentication). TTA supports source authentication as well as dynamic authorization change. In addition, its computation and communication overhead is low.
Atul Prakash, Xin Zhao, "Source Authentication in Group Communication Systems", 2012 23rd International Workshop on Database and Expert Systems Applications, vol. 00, no. , pp. 455, 2003, doi:10.1109/DEXA.2003.1232064
94 ms
(Ver 3.3 (11022016))