Advertisement

A System for End-to-End Authentication of Adaptive Multimedia Content

  • Takashi Suzuki
  • Zulfikar Ramzan
  • Hiroshi Fujimoto
  • Craig Gentry
  • Takehiro Nakayama
  • Ravi Jain
Conference paper
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 175)

Abstract

We present a multimedia content delivery system that preserves the end-to-end authenticity of original content while allowing content adaptation by intermediaries. Our system utilizes a novel multi-hop signature scheme using Merkle trees that permits selective element removal and insertion. To permit secure element insertion we introduce the notion of a placeholder. We propose a computationally efficient scheme to instantiate placeholders based on the hash-sign-switch paradigm using trapdoor hash functions. We developed a system prototype in which the proposed signature scheme is implemented as an extension of the W3C XML signature standard and is applied to content meta-data written in XML. Evaluation results show that the proposed scheme improves scalability and response time of protected adaptive content delivery systems by reducing computational overhead for intermediaries to commit to the inserted clement by 95% compared to schemes that use conventional digital signatures.

Keywords

Digital signatures content adaptation multimedia security 

References

  1. [1]
    NTT DoCoMo i-mode. http://www.nttdocomo.com/corebiz/imode.Google Scholar
  2. [2]
    M. Etoh and S. Sekiguchi. MPEG-7 enabled digest video streaming over 3G mobile network. 12th International Packet Video Workshop (PV2002), Apr '02.Google Scholar
  3. [3]
    O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, vol. 33, no. 4, 1986, pp 210–217.MathSciNetCrossRefGoogle Scholar
  4. [4]
    C. Gentry, A. Hevia, R. Jain, T. Kawahara, and Z. Ramzan. End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. To Appear in J. Selected Areas of Communication, Ql, 2005.Google Scholar
  5. [5]
    Microsoft Windows Media 9 Series, http://www.microsoft.com/windows.Google Scholar
  6. [6]
    Real Networks. RealOne player, http://www.realnetworks.com.Google Scholar
  7. [7]
    IETF RFC 3238. http://www.ietf.org/rfc/rfc3238.txt.Google Scholar
  8. [8]
    IETF Open Pluggable Edge Services (OPES) Working Group. http://www.ietf.org/html.charters/opes-charter.html.Google Scholar
  9. [9]
    IBM alphaWorks XML Security Suite, http://www.alphaworks.ibm.com/tech/.Google Scholar
  10. [10]
    T. Yuuichi, T. Kaori, O. Takeshi, S. Shinji, and M. Hideo. ASIA: Information Sharing System with Derived Content Restriction Management. IEICE Transactions on Communications (Japanese Edition), vol. 428, pp 1463–1475, Aug '03.Google Scholar
  11. [11]
    W3C Recommendation. Synchronized Multimedia Integration Language (SMIL 2.0). http://www.w3.org/TR/smil20. Aug '01.Google Scholar
  12. [12]
    R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. CT-RSA, Lecture Notes in Computer Science, vol. 2271, pp 244–262, 2002.MathSciNetCrossRefGoogle Scholar
  13. [13]
    A. Shamir and Y. Tauman. Improved Online/Offline Signature Schemes. Proc. of Crypto 2001, pp 355–367.Google Scholar
  14. [14]
    W3C Recommendation. XML-Signature Syntax and Processing. http://www.w3.org/TR/xmldsig-core. Feb'02.Google Scholar
  15. [15]
    National Institute of Standards and Technology, U.S. Department of Commerce. Secure Hash Standard. Federal Information Processing Standards Publication 180-1, Apr. 1995.Google Scholar
  16. [16]
    OASIS Committee. eXtensible Access Control Markup Language vl.0. http://www.oasis-open.org. Feb'03.Google Scholar
  17. [17]
    R. Merkle. Protocols for Public Key Cryptosystems. Proc. of the IEEE Symposium on Security and Privacy, pp 122–134, 1980.Google Scholar
  18. [18]
    H. Krawczyk and T. Rabin. Chameleon Hashing and Signature. Proc. of NDSS '2000.Google Scholar
  19. [19]
    D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. Proc. of Eurocrypt '03. LNCS 2656, pp. 416–432.Google Scholar
  20. [20]
    S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing. 17(2), pp281–308, 1988.MathSciNetCrossRefzbMATHGoogle Scholar
  21. [21] OMA. DRM2.0 Enabler Release, http://www.openmobilealliance.org. Feb '04.Google Scholar
  22. [22]
    R. Steinfeld, L. Bull and Y. Zheng. Content Extraction Signatures. Proc. of ICISC 2001. LNCS, vol.2288, pp.285–304.Google Scholar
  23. [23]
    W3C Recommendation. SOAP v 1.2. http://www.w3.org/TR/SOAP. June '03.Google Scholar
  24. [24]
    W3C Recommendation. XSL Transformations vl.0. http://www.w3.org/TR/xslt. Nov '99.Google Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Takashi Suzuki
    • 1
  • Zulfikar Ramzan
    • 2
  • Hiroshi Fujimoto
    • 1
  • Craig Gentry
    • 2
  • Takehiro Nakayama
    • 1
  • Ravi Jain
    • 2
  1. 1.NTT DoCoMo Media Computing GroupJapan
  2. 2.DoCoMo Communications LaboratoriesUSA

Personalised recommendations