Efficient multicast stream authentication for the fully adversarial network model

Christophe Tartary*, Huaxiong Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

9 Citations (Scopus)

Abstract

We consider the stream authentication problem when an adversary has the ability to drop, reorder or inject data packets in the network. We propose a coding approach for multicast stream authentication using the list-decoding property of Reed-Solomon codes. We divide the data to be authenticated into a stream of packets and associate a single signature for every λ n packets where λ and n are predesignated parameters. Our scheme, which is also joinable at the boundary of any n-packet block, can be viewed as an extension of Lysyanskaya, Tamassia and Triandopoulos's technique in which λ = 1. We show that by choosing λ and n appropriately, our scheme outperforms theirs in both signature and verification time. Our approach relies on signature dispersion as SAIDA and eSAIDA. Assuming that we use RSA for signing and MD5 for hashing, we give an approximation of the proportion of extra packets per block which could be processed via our technique with respect to the previous scheme. As example when we process λ = 1000 blocks of 20000 64-byte-packets, the gain of our scheme with respect to Lysyanskaya et al.'s is about 30%.

Original languageEnglish
Title of host publicationInformation Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
EditorsJooseok Song, Teakyoung Kwon, Moti Yung
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages108-125
Number of pages18
Volume3786 LNCS
ISBN (Print)3540310126, 9783540310129
Publication statusPublished - 2005
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 22 Aug 200524 Aug 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other6th International Workshop on Information Security Applications, WISA 2005
Country/TerritoryKorea, Republic of
CityJeju Island
Period22/08/0524/08/05

Fingerprint

Dive into the research topics of 'Efficient multicast stream authentication for the fully adversarial network model'. Together they form a unique fingerprint.

Cite this