@inproceedings{9b3c8bae65714b4a8f206978cae3431d,
title = "Rateless codes for the multicast stream authentication problem",
abstract = "We study the multicast authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. We first study the packet authentication probability of a scheme proposed by Lysyanskaya, Tamassia and Triandopoulos in 2003 since our opponent model is based on theirs. Using a family of rateless codes called Luby Transform codes (LT codes) we design a protocol which allows any packet to be authenticated at the receiver with probability arbitrary close to 1. We also compare LT codes to other families of rateless codes which could be used in that context in order to minimize the packet overhead as well as the time complexity of encoding and decoding data.",
author = "Christophe Tartary and Huaxiong Wang",
year = "2006",
language = "English",
isbn = "3540476997",
volume = "4266 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "136--151",
editor = "Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin-ichi Kawamura",
booktitle = "Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings",
address = "United States",
note = "1st International Workshop on Security, IWSEC 2006 ; Conference date: 23-10-2006 Through 24-10-2006",
}