Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques


Autoria(s): Al-Ibrahim, Mohamed; Pieprzyk, Josef
Data(s)

2001

Resumo

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

Identificador

http://eprints.qut.edu.au/73209/

Publicador

Springer Berlin Heidelberg

Relação

DOI:10.1007/3-540-47734-9_24

Al-Ibrahim, Mohamed & Pieprzyk, Josef (2001) Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In Networking — ICN 2001. Springer Berlin Heidelberg, pp. 239-249.

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Book Chapter