Abstract
To enable widespread commercial stream services, authentication is an important and challenging problem. There are three issues to consider for authenticating live streams: computation cost on the sender, communication overhead and verification probability on the receiver. As far as we know, SAIDA (Signature Amortization using IDA) is claimed to be the best algorithm in terms of the verification probability. In this paper, we describe eSAIDA, an efficient stream authentication scheme that is an improvement of SAIDA. We prove that under the restricted condition, the verification probability of eSAIDA is not less than that of SAIDA. Simulation results showed that under the same communication overhead its verification probability is much higher than that of SAIDA. Under various conditions, we measured the elapsed time of each scheme on the sender, which showed that the computation cost of the eSAIDA is lower than that of SAIDA.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C. (April 1995)
Bleichenbacher, D., Maurer, U.: Optimal tree-based one-time digital signature schemes. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 363–374. Springer, Heidelberg (1996)
Borella, M.S., Swider, D., Uludag, S., Brewster, G.: Internet Packet Loss: Measurement and Implications for End-to-End QoS. In: International Conference on Parallel Processing (1998)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: NDSS 2001, pp. 13–22 (2001)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of AppliedCrypto graphy. CRC Press, Boca Raton (1997)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient Multicast Packet Authentication Using Signature Amoritization. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Perrig, A.: The BiBa One-Time Signature and Broadcast Authentication Protocol. In: 8th ACM Conference on Computer and Communication Security, November 2001, pp. 28–37 (2001)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proceedings of IEEE Security and Privacy Symposium (May 2000)
Rabin, M.O.: Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the Association for Computing Machinery 36(2), 335–348 (1989)
Rivest, R.L., Shamir, A., Adelman, L.M.: A Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: 6th ACM Conference on Computer and Communication Security (November 1999)
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)
Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modelling of the temporal dependence in packet loss. In: IEEE INFOCOM 1999 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, Y., Cho, Y. (2004). The eSAIDA Stream Authentication Scheme. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3046. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24768-5_86
Download citation
DOI: https://doi.org/10.1007/978-3-540-24768-5_86
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22060-2
Online ISBN: 978-3-540-24768-5
eBook Packages: Springer Book Archive