Skip to main content

How to Authenticate Real Time Streams Using Improved Online/Offline Signatures

  • Conference paper
Cryptology and Network Security (CANS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3810))

Included in the following conference series:

Abstract

Providing authentication protocols for real time streams is a challenging task. This is because the authentication rate is very important for real time streams, whereas it is usually a bottleneck. Using improved online/offline signatures and hash chain techniques as tools, our proposed protocol greatly reduces the online computational and communicational cost and thus is more applicable to authenticate real time streams.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 62–73. ACM Press, New York (1993)

    Chapter  Google Scholar 

  2. Diffie, W., Hellman, M.E.: Multiuser cryptographic techniques. In: Proc. AFIPS 1976 National Computer Conference, Montvale, N.J. AFIPS, pp. 109–112 (1976)

    Google Scholar 

  3. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  4. Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)

    Google Scholar 

  5. Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proc. 19th ACM Symp. on Theory of Computing, May 1987, pp. 210–217 (1987)

    Google Scholar 

  6. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)

    Google Scholar 

  7. Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  8. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  9. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988); Special issue on cryptography

    Article  MATH  MathSciNet  Google Scholar 

  10. Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), San Diego, CA, February 2001, pp. 13–22. Internet Society (2001)

    Google Scholar 

  11. Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2000), San Diego, CA, February 2000, pp. 143–154. Internet Society (2000)

    Google Scholar 

  12. Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL 1998, SRI International (October 1979)

    Google Scholar 

  13. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, pp. 42–44 (1987)

    Google Scholar 

  14. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  15. Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 232–246. IEEE Computer Society, Los Alamitos (2001); Technical Committee on Security and Privacy

    Google Scholar 

  16. National Bureau of Standards. Digital signature standard. Technical Report FIPS Publication 186, National Bureau of Standards (1994)

    Google Scholar 

  17. Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: NDSS (2003)

    Google Scholar 

  18. Perrig, A., Canetti, R., Tygar, D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2000. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  19. Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  20. Rabin, M.O.: Digitalized signatures. In: Foundations of Secure Computation, pp. 155–168. Academic Press, London (1978)

    Google Scholar 

  21. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  22. Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. In: IEEE ICNP 1998 (1998)

    Google Scholar 

  24. Wu, Y., Ma, D., Xu, C.: Efficient object-based stream authentication. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 354–367. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gao, Cz., Yao, Za. (2005). How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_12

Download citation

  • DOI: https://doi.org/10.1007/11599371_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30849-2

  • Online ISBN: 978-3-540-32298-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics