Authentication of transit flows and k-siblings one-time signature

Mohamed Al-Ibrahim, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

We exploit the unique features of the k-sibling Intractable hashing method in presenting two authentication schemes. In the first scheme, we propose a method which enables intermediate nodes in IP communication networks to verify the authenticity of transit flows. While in the second scheme, we introduce a new one-time digital signatures scheme.
Original languageEnglish
Title of host publicationAdvanced communications and multimedia security
Subtitle of host publicationIFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portorož, Slovenia
EditorsBorka Jerman-Blažič, Tomaž Klobučar
Place of PublicationBoston, Mass. ; London
PublisherKlumer Academic Publishers
Pages41-55
Number of pages15
ISBN (Print)1402072066
DOIs
Publication statusPublished - 2002
EventIFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (6th : 2002) - Portoroz, Slovenia
Duration: 26 Sep 200227 Sep 2002

Publication series

NameIFIP Advances in Information and Communication Technology
ISSN (Print)1868-4238

Conference

ConferenceIFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (6th : 2002)
CityPortoroz, Slovenia
Period26/09/0227/09/02

Keywords

  • network security
  • k-sibling hashing
  • source authentication
  • one-time signatures

Fingerprint Dive into the research topics of 'Authentication of transit flows and k-siblings one-time signature'. Together they form a unique fingerprint.

Cite this