1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Digital Signatures and Hash Functions. Digital Signatures.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards Computer and Information Security Ming-Hong Shih.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
Group Key Distribution Chih-Hao Huang
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Brian Padalino Sammy Lin Arnold Perez Helen Chen
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Digital Signatures, Message Digest and Authentication Week-9.
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Group Key Distribution Xiuzhen Cheng The George Washington University.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Network Security Celia Li Computer Science and Engineering York University.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Fall 2006CS 395: Computer Security1 Key Management.
Lifecycle Metadata for Digital Objects October 9, 2002 Transfer / Authenticity Metadata.
ID-base Signature from Pairings on Elliptic Curve Kenneth G. Paterson From IACR Server 2002/004 Reference :Identity-Based Encryption from the Weil Pairing.
1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.
無線環境的認證方法及其在電子商務應用之研究
A secure and traceable E-DRM system based on mobile device
Efficient password authenticated key agreement using smart cards
Electronic Payment Security Technologies
Presentation transcript:

1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua Science and Technology, vol. 14, no. 2, pp , 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 )

2 Introduction A a.wmv Frame 1Frame 2Frame 3 … Frame N B Frame 1 Frame 2 P2P Live streaming Live to watch a.wmv

3 Challenges in streaming systems High bit rates End-to-end delay Packet losses Network congestion Service guarantees Security

4 Motivation For P2P live media streaming, authors proposed a secure scheme using user authentication and key managements.

5 Requirements Confidentiality Data integrity Scalability Efficient

6 User authentication Notation AS Authorization server PriK AS, PubK AS Private and corresponding public keys from the AS n Total number of users U i, U j i-th and j-th users PriK i, PubK i Private and corresponding public keys of U i CT i Certificate of U i H m (x) H m (x)=H(H m-1 (x)), m>1, H() is a one-way hash T s, T e certificate lifetime RS i Private number for U i only known by AS

7 User authentication Certificate generation New user U i AS Generate PriK i, PubK i Generate random value R i, and calculate H m (R i ) Login request Verify U i Generate CT i CT i ={ID i |T s |T e |T|IP i |PubK i | H m (R i )|H m (RS i )|SigN i } CTi

8 User authentication Certificate update user U i AS Between frames, 0<t<m {ID i |t|H m-t (R i )} Check whether H(H m-t (R i ))=H m-(t-1) (R i ) {ID i |H m-t (RS i )}

9 User authentication Certificate verification (U k verify U i ) user U i user U k CT i Verify CT i CT i ={ID i |T s |T e |T|IP i |PubK i | H m (R i )|H m (RS i )|SigN i } {M i |E(M i )} Select random value M i Encrypt M i by PriK i Decrypt E(M i )by PubK i Get M i ’ Check whether Mi’=M i Select random value M k as symmetric secret key Encrypt M k by PubKi {E(Mk}{E(Mk} Decrypt E(M k )by PriK i to get M k

Key management Every user has a logic key tree 10 Key of secure channel Logic key tree of j before i joins

11 Key management User i joins to j Logic key tree of j after i joins 1. j sends {Pubk i (K 8 ), K 8 (K’ 78 ), K’ 78 (K’ 58 ), K’ 58 (KEK’)} to i 2. j sends other key materials to its old neighbors. e.g. j sends {K 7 (K’ 78 ), K’ 78 (K’ 58 ), K’ 58 (KEK’)} to U 7

12 Key management User i leaves j Logic key tree of j before i leavesLogic key tree of j after i leaves When i leaves, j changes some of the key values and send to its neighbors e.g. j sends {K 4 (K’ 34 ), K’ 34 (K’ 14 ), K’ 14 (KEK’)} to U 4

13 此篇 paper 之優缺點 優點 : 延伸 authentication 及 key management 應用 在 P2P live streaming protocol 缺點 : Certificate verification 無相互驗證

14 可能研究方向 Certificate verification 相互驗證 加入付費機制