Font Size: a A A

Design Of A Deniable Source Authentication Protocol For Multicast And Its Application

Posted on:2013-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:M CuiFull Text:PDF
GTID:2210330374959915Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of internet technology, some common affairs in our daily life, such as online negotiations, electronic voting, and electronic commerce and so on, can be implemented on the internet gradually. These network applications have a common and special requirement:the private data of the users mustn't be obtained by the third party, which includes the data that the user sent, and the records which the users had transmitted these data, so, the concept of deniable source authentication is proposed. Deniable source authentication protocol is a special kind of authentication protocol, which allows the receiver to authenticate the identity of the sender, but the receiver can't prove the source of the data to any other third party.So far as now, there have been some research achievements about deniable source authentication already, but these achievements are only based on unicast network, and there has not yet seen any relevant literature published on deniable source authentication based on multicast environment. In multicast networks, it is required that membership could be change at any time, and the interaction between the sender and receiver need to be as little as possible. So under the multicast network, deniable source authentication protocol should be different from that under the unicast network, and it needs to be redesigned.Based on the above analysis, the main researches of this thesis are as follows:(1) Based on the bilinear pairings and the qualified pair, designed a deniable source authentication protocol for multicast--DMSA, this protocol does not require receivers be online at all times; allow the membership changed at any time, and even can deal with the membership changes easily.(2) Based on bilinear pairings, designed an anonymous authentication scheme BAA. In this scheme, in addition to the sender's anonymity features, the user can update his own temporary status information without the participation of the trusted third party, and the trusted third party even does not need to maintain the user's temporary information, in this way, for the whole scheme, the dependence to the trusted third party is reduced.(3) Based on the two basic protocols proposed in (1) and (2), designed an upper-layer protocol of deniable source authentication protocol--an anonymous communication scheme (BAC). This scheme realized the sender's anonymity completely, that is to say, except the trusted third party, any other third parties and receivers cannot identify the sender's real identity.
Keywords/Search Tags:Deniable Authentication, Source Authentication, Secure Multicast, Bilinear Pairing, Anonymous Communication
PDF Full Text Request
Related items