Authenticating multicast streams in lossy channels using threshold techniques

Mohamed Al-Ibrahim, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

11 Citations (Scopus)

Abstract

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

Original languageEnglish
Title of host publicationNetworking - ICN 2001
Subtitle of host publicationFirst International Conference on Networking Colmar, France, July 9–13, 2001 Proceedings, Part II
EditorsPascal Lorenz
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages239-249
Number of pages11
Volume2094
ISBN (Electronic)3540423036, 9783540477341
ISBN (Print)9783540423034
DOIs
Publication statusPublished - 2001
Event1st International Conference on Networking, ICN - 2001 - Colmar, France
Duration: 9 Jul 200113 Jul 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2094
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st International Conference on Networking, ICN - 2001
CountryFrance
CityColmar
Period9/07/0113/07/01

Fingerprint

Dive into the research topics of 'Authenticating multicast streams in lossy channels using threshold techniques'. Together they form a unique fingerprint.

Cite this