Authentication of Anycast Communication

  • Mohamed Al-Ibrahim
  • Anton Cerny
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)


Anycast is a communication mode in which the same address is assigned to a group of servers and a request sent for a service is routed to the “best” server. The measure of best could be the number of hops, available bandwidth, load of the server, or any other measure. With this scenario, any host could advertise itself as anycast server in order to launch denial-of-service attack or provide false information. In this paper, we solve this problem by proposing an authentication scheme for anycast communication.


Anycast authentication proxy signature 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bhattaachrjee, S., Ammar, M., Zegura, E., Fei, Z.: Application-layer anycasting. In: proceedings of the IEEE INFOCOM 1997 (1997)Google Scholar
  2. 2.
    Hinden, R.M.: IP next generation overview. Internet draft,
  3. 3.
    Hwang, K.S.J., Shi, C.-H.: A Simple multiproxy signature scheme. In: proceedings of the tenth national conference on Information Security, Taiwan, pp. 134–138 (2000)Google Scholar
  4. 4.
    Kim, S., Park, S., Won, D.: Proxy signatures, Revisted. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 223–232. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: the Symposium on Cryptography and Information Security, SCIS 2001, Japan (2001)Google Scholar
  6. 6.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. IEICE Trans. Fundamentals E79-A(9), 1338–1354 (1996)Google Scholar
  7. 7.
    Schnorr, C.: Efficient Signature Generation by Smart Cards. Journal of Cryptology 4(3), 161–174 (1991)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Yi, L., Bai, G., Xia, G.: Proxy multi-signature scheme: A new type of proxy signature scheme. Electronic letters 36(6), 527–528 (2000)CrossRefGoogle Scholar
  9. 9.
    Zhang, K.: Threshold proxy signature scheme. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396. Springer, Heidelberg (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Mohamed Al-Ibrahim
    • 1
  • Anton Cerny
    • 2
  1. 1.Center for Advanced Computing, Computing DepartmentMacquaire UniversitySydneyAustralia
  2. 2.Department of Mathematics and Computer ScienceKuwait UniversitySafatKuwait

Personalised recommendations