Skip to main content

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2094))

Abstract

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Gennaro and P. Rohatchi, “ How to Sign Digital Streams, CRYPTO’97, Lecture Notes in Computer Science 1249, Springer-Verlag, 1997, pp 180–197

    Google Scholar 

  2. R. Canetti, J. Garay, G. Itkins, D. Micciancio, M. Naor and B. Pinkas, “ Multicast Security: A Taxonomy and some efficient Constructions”, IEEE INFOCOM’99.

    Google Scholar 

  3. C. Wong, S. Lam, “Digital Signatures for Flows and Multicasts”, Proceedings IEEE ICNP’ 98, Austin TX, Oct 1998.

    Google Scholar 

  4. A. Perrig, R. Canetti, J.D. Tygar, D. Song, “ Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE 2000 online.

    Google Scholar 

  5. P. Rohatchi, “ A Compact and fast hybrid signature scheme for multicast packet Authentication”, In the 6th Conference on Computer and Communications Security, November 1999.

    Google Scholar 

  6. P. Golle, “ Authenticating Streamed Data in the presence of random packet loss”, extended abstract, internet draft 2000.

    Google Scholar 

  7. S. Even, O. Goldreich, S. Micali, “ On-Line/Off-Line Digital Signatures”, Journal of Cryptology, 9(1): 35–67, 1996.

    MATH  MathSciNet  Google Scholar 

  8. J. Pieprzyk, “ A Book in Computer Security ”, internet edition, 2000

    Google Scholar 

  9. SMUG web site, http://www.securemulticast.org

  10. R. Canetti, B. Pinkas, “A taxonomy of Multicast Security Issues”, <draft-irtf-smugtaxonomy-01.txt> August 2000

    Google Scholar 

  11. A. Shamir, “ How to share a Secret”, Communications of ACM; 22: 612–613,Nov97

    Google Scholar 

  12. G. R. Blakley, “Safeguarding Cryptographic Keys”, in the proc. AFIP 1979 National Computer Conference, bp. 813–817. AFIPS 1979.

    Google Scholar 

  13. 12 Marshall Hall, “ Combinatorial Theory”, A Wiley-Inter-science Publication John Wiley and sons, 1986

    Google Scholar 

  14. C. J. Colbourn, J. H. Dinitz, “ The CRC Handbook of Combinatorial Designs”, CRC press 1996

    Google Scholar 

  15. Wu-chi Feng, “ Buffering Techniques for Delivery of Compressed Video in video on Demand Systems”, Kluwer Academic Publisher, 1997

    Google Scholar 

  16. L. McCarthy, “ RTP for source Authentication and Non-Repudiation of Audio and Video conferences”, draft-mccarthy-smug-rtp-profile-src-auth-00.txt, May 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Al-Ibrahim, M., Pieprzyk, J. (2001). Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_24

Download citation

  • DOI: https://doi.org/10.1007/3-540-47734-9_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42303-4

  • Online ISBN: 978-3-540-47734-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics