Achieving multicast stream authentication using mds codes

Christophe Tartary, Huaxiong Wang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)


We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, packet overhead and computing efficiency are important parameters to be taken into account when designing a multicast authentication protocol. Our construction will exhibit three main advantages. First, our packet overhead will only be a few hashes long. Second, we will exhibit a number of signature verifications to be performed by the receivers which will turn to be O(1). Third, every receiver will still be able to recover all the data packets emitted by the sender despite losses and injections occurred during the transmission of information.

Original languageEnglish
Title of host publicationCryptology and Network Security - 5th International Conference, CANS 2006, Proceedings
EditorsDavid Pointcheval, Yi Mu, Kefei Chen
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Number of pages18
Volume4301 LNCS
ISBN (Print)9783540494621
Publication statusPublished - 2006
Event5th International Conference on Cryptology and Network Security, CANS 2006 - Suzhou, China
Duration: 8 Dec 200610 Dec 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4301 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


Other5th International Conference on Cryptology and Network Security, CANS 2006


Dive into the research topics of 'Achieving multicast stream authentication using mds codes'. Together they form a unique fingerprint.

Cite this