Min-Shiang Hwang
Institute of Networking and Communication Engineering of Technology, 168, Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C.
Wei-Pang Yang
Department of Computer and Information Science, National Chiao Tung University
ABSTRACT
Providing security for electronic documents is an important issue. Particularly when a message must be delivered to more than one destination and authentication is required. In this study, this problem is solved using a group authentication detection method. Each recipient is not required to authenticate the documents. In contrast, the sender authenticates these documents whenever all recipients have received them.
PDF References Citation
How to cite this article
Min-Shiang Hwang and Wei-Pang Yang, 2002. An Authentication Protocol for Multicast Communications. Journal of Applied Sciences, 2: 1082-1083.
DOI: 10.3923/jas.2002.1082.1083
URL: https://scialert.net/abstract/?doi=jas.2002.1082.1083
DOI: 10.3923/jas.2002.1082.1083
URL: https://scialert.net/abstract/?doi=jas.2002.1082.1083
REFERENCES
- Jerman-Blazic, B., 1991. Security in value added networks security requirements for EDI. Comput. Standards Interfaces, 12: 23-33.
CrossRefDirect Link - Chiou, G.H. and W.T. Chen, 1989. Secure broadcasting using the secret lock. IEEE. Trans. Software Eng., 15: 929-934.
Direct Link - Mitchell, C.J., 1992. Authenticating multicast internet electronic mail messages using a bidirectional MAC is insecure. IEEE Trans. Comput., 41: 505-507.
CrossRefDirect Link - Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRefDirect Link - Ingemarsson, I., D.T. Tang and C.K. Wong, 1982. A conference key distribution system. IEEE Trans. Inform. Theory, 28: 714-720.
Direct Link - Laih, C.S., L. Harn and J.Y. Lee, 1989. A new thrshold scheme and its applications on designing the conferenvce key distribution cryptosystem. Inform. Process. Lett., 32: 95-99.
CrossRef - Rompel, J., 1990. One-way functions are necessary and sufficient for secure signatures. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, Baltimore, Maryland, USA., pp: 387-394.
Direct Link - Housley, R., 1990. Electronic messaging security: A comparison of three approches. Proceedings of the 5th Annual Computer Security Applications Conference, Dec. 4-8, Tucson, AZ., USA., pp: 29-29.
Direct Link