Skip to main content

Efficient Object-Based Stream Authentication

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2002 (INDOCRYPT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2551))

Included in the following conference series:

Abstract

This paper presents an object-based stream authentication scheme for practical end-to-end applications on present network infrastructure and protocols. In this proposal, a stream is divided into objects that are delivered sequentially. Each object consists of a unique identifier, content and operations. At the sender side, a locked object identifieris produced by encrypting the object identifier with a key generated from MAC of the object content. The object content and locked identifier are transmitted to the receiver. The receiver can recover the object identifier and check it to authenticate the object. The scheme tolerates packet loss, and incurs no additional overhead if an identifier is ingeniously chosen. In the experiment, we overload some particular fields in the headers of standard protocols as object identifier to implement a real time video stream authentication scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Rosario Gennaro, Rankaj Rohatgi, “How to Sign Digital Streams”, CRYPTO’97, LNCS 1294, pp.180–197

    Google Scholar 

  2. Chung Kei Wong and Simon S. Lam, “Digital Signatures for Flows and Multicasts”, IEEE ICNP’98, http://citeseer.nj.nec.com/wong98digital.html

  3. A. Perrig, R. Canetti, D. Tygar and D. Song, “Efficient Authentication and Signature of Multicast Streams over Lossy Channels”, IEEE Symposium on Security and Privacy, 2000

    Google Scholar 

  4. Sara Miner and Jessica Staddon, “Graph-Based Authentication of Digital Streams”, IEEE Symposium on Security and Privacy, 2001

    Google Scholar 

  5. Jung Min Park, Edwin K.P. Chong and Howard Jay Siegel, “Efficient Multicast Packet Authentication Using Signature Amortisation”, IEEE Symposium on Security and Privacy, 2002

    Google Scholar 

  6. H. Schulzrinne, GMD Fokus, S. Casner, R. Frederick and V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications”, RFC 1889, 1996

    Google Scholar 

  7. T. Turletti and C. Huitema, “RTP Payload Format for H.261 Video Stream”, RFC 2032, 1996

    Google Scholar 

  8. M. Bellare, R. Canetti and H. Krawczyk, “Keying Hash Functions for Message Authentication”, CRYPTO’96, LNCS 1109, pp.1–15, 1996

    Google Scholar 

  9. P. Rohatgi. “A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication”, 6th ACM Conference on Computer and Communication Security, pp.93–100, 1999

    Google Scholar 

  10. A. Perrig, R. Canetti, D. Tygar and D. Song, “Efficient and Secure Source Authentication for Multicast”, ISOC Network and Distributed System Security Symposium (NDSS), 2001

    Google Scholar 

  11. Philippe Golle and Nagendra Modadugu, “Authenticating Streamed Data in the Presence of Random Packet Loss”, ISOC Network and Distributed System Security Symposium(NDSS), 2001, http://www.isoc.org/isoc/conferences/ndss/01/2001/index.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, Y., Ma, D., Xu, C. (2002). Efficient Object-Based Stream Authentication. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-36231-2_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00263-5

  • Online ISBN: 978-3-540-36231-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics