Abstract
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
R. Gennaro and P. Rohatchi, “ How to Sign Digital Streams, CRYPTO’97, Lecture Notes in Computer Science 1249, Springer-Verlag, 1997, pp 180–197
R. Canetti, J. Garay, G. Itkins, D. Micciancio, M. Naor and B. Pinkas, “ Multicast Security: A Taxonomy and some efficient Constructions”, IEEE INFOCOM’99.
C. Wong, S. Lam, “Digital Signatures for Flows and Multicasts”, Proceedings IEEE ICNP’ 98, Austin TX, Oct 1998.
A. Perrig, R. Canetti, J.D. Tygar, D. Song, “ Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE 2000 online.
P. Rohatchi, “ A Compact and fast hybrid signature scheme for multicast packet Authentication”, In the 6th Conference on Computer and Communications Security, November 1999.
P. Golle, “ Authenticating Streamed Data in the presence of random packet loss”, extended abstract, internet draft 2000.
S. Even, O. Goldreich, S. Micali, “ On-Line/Off-Line Digital Signatures”, Journal of Cryptology, 9(1): 35–67, 1996.
J. Pieprzyk, “ A Book in Computer Security ”, internet edition, 2000
SMUG web site, http://www.securemulticast.org
R. Canetti, B. Pinkas, “A taxonomy of Multicast Security Issues”, <draft-irtf-smugtaxonomy-01.txt> August 2000
A. Shamir, “ How to share a Secret”, Communications of ACM; 22: 612–613,Nov97
G. R. Blakley, “Safeguarding Cryptographic Keys”, in the proc. AFIP 1979 National Computer Conference, bp. 813–817. AFIPS 1979.
12 Marshall Hall, “ Combinatorial Theory”, A Wiley-Inter-science Publication John Wiley and sons, 1986
C. J. Colbourn, J. H. Dinitz, “ The CRC Handbook of Combinatorial Designs”, CRC press 1996
Wu-chi Feng, “ Buffering Techniques for Delivery of Compressed Video in video on Demand Systems”, Kluwer Academic Publisher, 1997
L. McCarthy, “ RTP for source Authentication and Non-Repudiation of Audio and Video conferences”, draft-mccarthy-smug-rtp-profile-src-auth-00.txt, May 1999
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Al-Ibrahim, M., Pieprzyk, J. (2001). Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_24
Download citation
DOI: https://doi.org/10.1007/3-540-47734-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42303-4
Online ISBN: 978-3-540-47734-1
eBook Packages: Springer Book Archive