Skip to main content

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

  • Conference paper
Networking — ICN 2001 (ICN 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2094))

Included in the following conference series:

Abstract

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. R. Gennaro and P. Rohatchi, “ How to Sign Digital Streams, CRYPTO’97, Lecture Notes in Computer Science 1249, Springer-Verlag, 1997, pp 180–197

    Google Scholar 

  2. R. Canetti, J. Garay, G. Itkins, D. Micciancio, M. Naor and B. Pinkas, “ Multicast Security: A Taxonomy and some efficient Constructions”, IEEE INFOCOM’99.

    Google Scholar 

  3. C. Wong, S. Lam, “Digital Signatures for Flows and Multicasts”, Proceedings IEEE ICNP’ 98, Austin TX, Oct 1998.

    Google Scholar 

  4. A. Perrig, R. Canetti, J.D. Tygar, D. Song, “ Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE 2000 online.

    Google Scholar 

  5. P. Rohatchi, “ A Compact and fast hybrid signature scheme for multicast packet Authentication”, In the 6th Conference on Computer and Communications Security, November 1999.

    Google Scholar 

  6. P. Golle, “ Authenticating Streamed Data in the presence of random packet loss”, extended abstract, internet draft 2000.

    Google Scholar 

  7. S. Even, O. Goldreich, S. Micali, “ On-Line/Off-Line Digital Signatures”, Journal of Cryptology, 9(1): 35–67, 1996.

    MATH  MathSciNet  Google Scholar 

  8. J. Pieprzyk, “ A Book in Computer Security ”, internet edition, 2000

    Google Scholar 

  9. SMUG web site, http://www.securemulticast.org

  10. R. Canetti, B. Pinkas, “A taxonomy of Multicast Security Issues”, <draft-irtf-smugtaxonomy-01.txt> August 2000

    Google Scholar 

  11. A. Shamir, “ How to share a Secret”, Communications of ACM; 22: 612–613,Nov97

    Google Scholar 

  12. G. R. Blakley, “Safeguarding Cryptographic Keys”, in the proc. AFIP 1979 National Computer Conference, bp. 813–817. AFIPS 1979.

    Google Scholar 

  13. 12 Marshall Hall, “ Combinatorial Theory”, A Wiley-Inter-science Publication John Wiley and sons, 1986

    Google Scholar 

  14. C. J. Colbourn, J. H. Dinitz, “ The CRC Handbook of Combinatorial Designs”, CRC press 1996

    Google Scholar 

  15. Wu-chi Feng, “ Buffering Techniques for Delivery of Compressed Video in video on Demand Systems”, Kluwer Academic Publisher, 1997

    Google Scholar 

  16. L. McCarthy, “ RTP for source Authentication and Non-Repudiation of Audio and Video conferences”, draft-mccarthy-smug-rtp-profile-src-auth-00.txt, May 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Al-Ibrahim, M., Pieprzyk, J. (2001). Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_24

Download citation

  • DOI: https://doi.org/10.1007/3-540-47734-9_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42303-4

  • Online ISBN: 978-3-540-47734-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics