|
|
Progess of the Research on IP Multicast Data Origin Authentication with Non-repudiation |
Zhang Hai-bo①②; Zhou Xian-wei①; Song Cun-yi① |
①University of Science and Technology Beijing, Beijing 100083, China;
②Computer Center of Beijing Institute of Clothing Technology, Beijing 100029, China |
|
|
Abstract Data origin authentication is an important part in the multicast security architecture. Data origin authentication can be classified as repudiation and non-repudiation. In this paper, several typical data origin authentication protocols with non-repudiation are summarized according to the taxonomy of data origin authentication with non-repudiation. The advantages and shortcomings of these protocols are discussed respectively, also the problems existed are anatomized in depth. This paper is a sum-up of the protocols of data origin authentication protocols with non-repudiation at the present time. The future trend and the remaining problems of data origin authentication with non-repudiation are also discussed.
|
Received: 07 April 2005
|
|
|
|
|
|
|
|