메뉴 건너뛰기




Volumn 2, Issue 3-4, 2007, Pages 175-191

Efficient multicast stream authentication for the fully adversarial network model

Author keywords

Reed Solomon codes; signature dispersion; stream authentication; THF; trapdoor hash function

Indexed keywords


EID: 85016433011     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.013172     Document Type: Article
Times cited : (15)

References (37)
  • 1
    • 35048864396 scopus 로고    scopus 로고
    • Authenticating multicast streams in lossy channels using threshold techniques
    • ICN 2001, July
    • Al-Ibrahim, M. and Pieprzyk, J. (2001) ‘Authenticating multicast streams in lossy channels using threshold techniques’, ICN 2001, July, Lecture Notes in Computer Science, Vol. 2094, pp.239–249.
    • (2001) Lecture Notes in Computer Science , vol.2094 , pp. 239-249
    • Al-Ibrahim, M.1    Pieprzyk, J.2
  • 2
    • 15744375170 scopus 로고    scopus 로고
    • A taxonomy of multicast data origin authentication: issues and solutions
    • Challal, Y., Bettahar, H. and Bouabdallah, A. (2004) ‘A taxonomy of mu▒lticast data origin authentication: issues and solutions’, IEEE Communications Surveys and Tutorials, Vol. 6, No. 3, pp.34–57.
    • (2004) IEEE Communications Surveys and Tutorials , vol.6 , Issue.3 , pp. 34-57
    • Challal, Y.1    Bettahar, H.2    Bouabdallah, A.3
  • 5
    • 33744979306 scopus 로고    scopus 로고
    • July
    • Dai, W. (2004) ‘Crypto++ 5.2.1 benchmarks’, July, Available at: http://www.eskimo.com/~weidai/benchmarks.html.
    • (2004) Crypto++ 5.2.1 benchmarks
    • Dai, W.1
  • 10
    • 85180799647 scopus 로고    scopus 로고
    • Authenticating streamed data in the presence of random packet loss
    • Golle, P. and Modadugu, N. (2001) ‘Authenticating streamed data in the presence of random packet loss’, NDSS 2001, February, Internet Society, pp.13–22.
    • (2001) NDSS 2001, February, Internet Society , pp. 13-22
    • Golle, P.1    Modadugu, N.2
  • 11
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometric codes
    • Guruswami, V. and Sudan, M. (1999) ‘Improved decoding of Reed-Solomon and algebraic-geometric codes’, IEEE Transactions on Information Theory, Vol. 45, No. 6, pp.1757–1767.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 18
  • 20
    • 1542625909 scopus 로고    scopus 로고
    • Efficient multicast stream authentication using erasure codes
    • Park, J.M., Chong, E.K.P. and Siegel, H.J. (2003) ‘Efficient multicast stream authentication using erasure codes’, ACM – TISSEC, Vol. 6, No. 2, pp.258–285.
    • (2003) ACM – TISSEC , vol.6 , Issue.2 , pp. 258-285
    • Park, J.M.1    Chong, E.K.P.2    Siegel, H.J.3
  • 21
    • 0036079874 scopus 로고    scopus 로고
    • Efficient multicast packet authentication using signature amortization
    • Park, J.M., Chong, E.K.P. and Siegel, H.J. (2002) ‘Efficient multicast packet authentication using signature amortization’, IEEE Symposium on Security and Privacy, May, pp.227–240.
    • (2002) IEEE Symposium on Security and Privacy , vol.May , pp. 227-240
    • Park, J.M.1    Chong, E.K.P.2    Siegel, H.J.3
  • 22
    • 47649129735 scopus 로고    scopus 로고
    • The eSAIDA stream authentication scheme
    • Park, Y. and Cho, Y. (2004) ‘The eSAIDA stream authentication scheme’, ICCSA, April, pp.799–807.
    • (2004) ICCSA , vol.April , pp. 799-807
    • Park, Y.1    Cho, Y.2
  • 23
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end Internet packet dynamics
    • June
    • Paxson, V. (1999) ‘End-to-end Internet packet dynamics’, IEEE/ACM Transactions on Networking, June, pp.277–292.
    • (1999) IEEE/ACM Transactions on Networking , pp. 277-292
    • Paxson, V.1
  • 24
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • Perrig, A., Canetti, R., Tygar, J.D. and Song, D. (2000) ‘Efficient authentication and signing of multicast streams over lossy channels’, IEEE Symposium on Security and Privacy, May, pp.56–73.
    • (2000) IEEE Symposium on Security and Privacy , vol.May , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 27
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing and fault tolerance
    • April
    • Rabin, M.O. (1989) ‘Efficient dispersal of information for security, load balancing and fault tolerance’, Journal of the Association for Computing machinery, April, Vol. 36, No. 2, pp.335–348.
    • (1989) Journal of the Association for Computing machinery , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 28
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • Rohatgi, P. (1999) ‘A compact and fast hybrid signature scheme for multicast packet authentication’, CCS’99, pp.93–100.
    • (1999) CCS’99 , pp. 93-100
    • Rohatgi, P.1
  • 29
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • August, Lecture Notes in Computer Science
    • Shamir, A. and Tauman, Y. (2001) ‘Improved online/offline signature schemes’, Advances in Cryptology – Crypto’01, August, Lecture Notes in Computer Science, Vol. 2139, pp.355–367.
    • (2001) Advances in Cryptology – Crypto’01 , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 33
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Efficient multicast stream authentication for the fully adversarial network model
    • Wang, X. and Yu, H. (2005) ‘How to break MD5 and other hash functions’, Advances in Cryptology – Eurocrypt’05, May, Lecture Notes in Computer Science, Vol. 3494, pp.19–35.Efficient multicast stream authentication for the fully adversarial network model
    • (2005) Advances in Cryptology – Eurocrypt’05, May, Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 34
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • August
    • Wong, C.K. and Lam, S.S. (1999) ‘Digital signatures for flows and multicasts’, IEEE/ACM Transactions on Networking, August, Vol. 7, No. 4.
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , Issue.4
    • Wong, C.K.1    Lam, S.S.2
  • 35
    • 0032677669 scopus 로고    scopus 로고
    • Measurement and modelling of the temporal dependence in packet loss
    • IEEE Press
    • Yajnik, M., Moon, S., Kurose, J. and Towsley, D. (1999) ‘Measurement and modelling of the temporal dependence in packet loss’, IEEE Infocom, IEEE Press, pp.345–352.
    • (1999) IEEE Infocom , pp. 345-352
    • Yajnik, M.1    Moon, S.2    Kurose, J.3    Towsley, D.4
  • 36
    • 85043077167 scopus 로고    scopus 로고
    • Since the data stream is large it is divided into fixed-size entities called packets
    • Since the data stream is large it is divided into fixed-size entities called packets.
  • 37
    • 85043068820 scopus 로고    scopus 로고
    • We call authentication tag the extra information appended to a packet to provide its authenticity
    • We call authentication tag the extra information appended to a packet to provide its authenticity.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.