DocumentCode :
2946258
Title :
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Author :
Chan, Haowen ; Perrig, Adrian
Author_Institution :
Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear :
2010
fDate :
16-19 May 2010
Firstpage :
257
Lastpage :
272
Abstract :
We consider resource-constrained broadcast authentication for $n$ receivers in a static, known network topology. There are only two known broadcast authentication protocols that do not use asymmetric cryptography, one-time signatures, multi-receiver MACs, or time synchronization [1], [2]. Both these protocols require three passes of a message front traversing the network. We investigate whether this amount of interaction can be improved efficiently for specific common topology classes, namely, linear topologies, tree topologies and fully connected topologies. We show modifications to the protocols allowing them to complete in just two passes in the linear and fully connected cases with a small constant factor increase in per-node communication overhead, and a further optimization that achieves the equivalent of just a single pass in the linear case with $O(log n)$ increase in per-node communication overhead. We also prove new lower bounds for round complexity, or the maximum number of consecutive interactions in a protocol. We show that protocols with efficient per-node communication overhead (polylogarithmic in $n$) must require at least $2log n$ rounds in any topology; this implies that our two-pass protocol in the fully-connected topology requires the fewest possible passes, and this bound is asymptotically tight for the full-duplex communication model. Furthermore, we show that communication-efficient protocols must take asymptotically more than $2log n$ rounds on trees; this implies that that there are some tree topologies for which two passes do not suffice and the existing three-pass algorithms may be optimal.
Keywords :
Authentication; Broadcasting; Computer networks; Computer security; Cryptographic protocols; Cryptography; Network topology; Optimization methods; Privacy; USA Councils; Broadcast Authentication; Fully Connected Topology; Linear Topology; Multicast Authentication; Path Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2010 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1081-6011
Print_ISBN :
978-1-4244-6894-2
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2010.22
Filename :
5504792
Link To Document :
بازگشت