Subscribe Now Subscribe Today
Research Article

An Authentication Protocol for Multicast Communications

Min-Shiang Hwang and Wei-Pang Yang
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Providing security for electronic documents is an important issue. Particularly when a message must be delivered to more than one destination and authentication is required. In this study, this problem is solved using a group authentication detection method. Each recipient is not required to authenticate the documents. In contrast, the sender authenticates these documents whenever all recipients have received them.

Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

  How to cite this article:

Min-Shiang Hwang and Wei-Pang Yang , 2002. An Authentication Protocol for Multicast Communications. Journal of Applied Sciences, 2: 1082-1083.

DOI: 10.3923/jas.2002.1082.1083


1:  Jerman-Blazic, B., 1991. Security in value added networks security requirements for EDI. Comput. Standards Interfaces, 12: 23-33.
CrossRef  |  Direct Link  |  

2:  Chiou, G.H. and W.T. Chen, 1989. Secure broadcasting using the secret lock. IEEE. Trans. Software Eng., 15: 929-934.
Direct Link  |  

3:  Mitchell, C.J., 1989. Multi-destination secure electronic mail. Comput. J., 32: 13-15.

4:  Mitchell, C.J., 1992. Authenticating multicast internet electronic mail messages using a bidirectional MAC is insecure. IEEE Trans. Comput., 41: 505-507.
CrossRef  |  Direct Link  |  

5:  Mitchell, C.J. and M. Walker, 1988. Solutions to the multimedidestination secure electronic mail problem. Comput. Security, 7: 483-488.

6:  Diffie, W. and M.E. Hellman, 1976. New directions in cryptography. IEEE Trans. Inform. Theory, 22: 644-654.
CrossRef  |  Direct Link  |  

7:  Ingemarsson, I., D.T. Tang and C.K. Wong, 1982. A conference key distribution system. IEEE Trans. Inform. Theory, 28: 714-720.
Direct Link  |  

8:  Koyama, K., 1992. Secure Conference Key Distribution System for Conspiracy Attack. In: Advances in Cryptology, Rueppel, R.A. (Ed.). Spnnger Verlag, Berlin, Heidelberg, pp: 449-453.

9:  Laih, C.S., L. Harn and J.Y. Lee, 1989. A new thrshold scheme and its applications on designing the conferenvce key distribution cryptosystem. Inform. Process. Lett., 32: 95-99.
CrossRef  |  

10:  Rompel, J., 1990. One-way functions are necessary and sufficient for secure signatures. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, Baltimore, Maryland, USA., pp: 387-394.

11:  Robin, H.S., P.D. Maher and A.M. Tjoa, 1993. Closing in on wirless privacy. At T Technol., 8: 22-25.

12:  Housley, R., 1990. Electronic messaging security: A comparison of three approches. Proceedings of the 5th Annual Computer Security Applications Conference, Dec. 4-8, Tucson, AZ., USA., pp: 29-29.

©  2021 Science Alert. All Rights Reserved