Advertisement

Cryptographic Algorithms for Multimedia Traffic

  • Rosario Gennaro
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2946)

Abstract

We survey several cryptographic algorithms that provide authentication and confidentiality for multimedia traffic over the Internet. We focus in particular on the problem of authenticating streams of data and on the problem of secure multicast, where streamed information is sent to a dynamic group of users.

Keywords

Encryption Scheme Signature Scheme Message Authentication Code Commitment Scheme Cryptographic Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. Operating Systems Review 32(4), 9–20 (1998)CrossRefGoogle Scholar
  2. 2.
    Bergadano, F., Cavagnino, D., Crispo, B.: Individual Source Authentication on the MBONE. In: Proceedings of ICME (2000)Google Scholar
  3. 3.
    Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)Google Scholar
  4. 4.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of INFOCOM (1999)Google Scholar
  5. 5.
    Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: Proceedings of the 13th Annual Computer Security Applications Conference (1997)Google Scholar
  6. 6.
    Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)Google Scholar
  7. 7.
    Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory 46(3) (May 2000)Google Scholar
  8. 8.
    Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)Google Scholar
  9. 9.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. Information and Computation 165, 100–116 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack. SIAM J. Comp. 17(2), 281–308 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Lamport, L.: Constructing Digital Signatures from a One-Way Function. Technical Report SRI Intl. CSL 98 (1979)Google Scholar
  12. 12.
    Merkle, R.: A Digital Signature based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  13. 13.
    Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  14. 14.
    Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    National Institute of Standard and Technology. Secure Hash Standard. NIST FIPS Pub 180-1 (1995)Google Scholar
  16. 16.
    Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient Authentication and Signature of Multicast Streams over Lossy Channels. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)Google Scholar
  17. 17.
    Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: Proceedings of ACM CCS 1999, pp. 93–100 (1999)Google Scholar
  18. 18.
    Stinson, D.: Cryptography. Theory and Practice. CRC Press, Boca Raton (1996)Google Scholar
  19. 19.
    Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. IETF Draft wallner-key (July 1997), Available from ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt
  20. 20.
    Wong, C., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: SIGCOMM (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Rosario Gennaro
    • 1
  1. 1.I.B.M. T.J.Watson Research CenterYorktown HeightsUSA

Personalised recommendations