Abstract
This paper presents an object-based stream authentication scheme for practical end-to-end applications on present network infrastructure and protocols. In this proposal, a stream is divided into objects that are delivered sequentially. Each object consists of a unique identifier, content and operations. At the sender side, a locked object identifieris produced by encrypting the object identifier with a key generated from MAC of the object content. The object content and locked identifier are transmitted to the receiver. The receiver can recover the object identifier and check it to authenticate the object. The scheme tolerates packet loss, and incurs no additional overhead if an identifier is ingeniously chosen. In the experiment, we overload some particular fields in the headers of standard protocols as object identifier to implement a real time video stream authentication scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Rosario Gennaro, Rankaj Rohatgi, “How to Sign Digital Streams”, CRYPTO’97, LNCS 1294, pp.180–197
Chung Kei Wong and Simon S. Lam, “Digital Signatures for Flows and Multicasts”, IEEE ICNP’98, http://citeseer.nj.nec.com/wong98digital.html
A. Perrig, R. Canetti, D. Tygar and D. Song, “Efficient Authentication and Signature of Multicast Streams over Lossy Channels”, IEEE Symposium on Security and Privacy, 2000
Sara Miner and Jessica Staddon, “Graph-Based Authentication of Digital Streams”, IEEE Symposium on Security and Privacy, 2001
Jung Min Park, Edwin K.P. Chong and Howard Jay Siegel, “Efficient Multicast Packet Authentication Using Signature Amortisation”, IEEE Symposium on Security and Privacy, 2002
H. Schulzrinne, GMD Fokus, S. Casner, R. Frederick and V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications”, RFC 1889, 1996
T. Turletti and C. Huitema, “RTP Payload Format for H.261 Video Stream”, RFC 2032, 1996
M. Bellare, R. Canetti and H. Krawczyk, “Keying Hash Functions for Message Authentication”, CRYPTO’96, LNCS 1109, pp.1–15, 1996
P. Rohatgi. “A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication”, 6th ACM Conference on Computer and Communication Security, pp.93–100, 1999
A. Perrig, R. Canetti, D. Tygar and D. Song, “Efficient and Secure Source Authentication for Multicast”, ISOC Network and Distributed System Security Symposium (NDSS), 2001
Philippe Golle and Nagendra Modadugu, “Authenticating Streamed Data in the Presence of Random Packet Loss”, ISOC Network and Distributed System Security Symposium(NDSS), 2001, http://www.isoc.org/isoc/conferences/ndss/01/2001/index.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, Y., Ma, D., Xu, C. (2002). Efficient Object-Based Stream Authentication. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_28
Download citation
DOI: https://doi.org/10.1007/3-540-36231-2_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00263-5
Online ISBN: 978-3-540-36231-9
eBook Packages: Springer Book Archive