2001
DOI: 10.1007/3-540-47734-9_24
|View full text |Cite
|
Sign up to set email alerts
|

Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2002
2002
2007
2007

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Denote q the left hand side of Inequality (2). Write τ as the concatenation a 0 · · · a ρ N of (ρ N + 1) elements of F 2 q after suitable padding.…”
Section: Algorithm 6 Authenticator2mentioning
confidence: 99%
See 2 more Smart Citations
“…Denote q the left hand side of Inequality (2). Write τ as the concatenation a 0 · · · a ρ N of (ρ N + 1) elements of F 2 q after suitable padding.…”
Section: Algorithm 6 Authenticator2mentioning
confidence: 99%
“…Along this line, several schemes were developed [2,[45][46][47][48] but none of them tolerates a single packet injection. In 2003, Lysyanskaya et al [35] designed a technique (called in this paper LTT) resistant to packet loss and data injections using Reed-Solomon codes [55] where the number of signature verifications to be performed per block 2 turns out to be O(1) as a function of the block length n. In 2004, Karlof et al developed a protocol called PRABS [27] using a maximum distance separable (MDS) code along with a one-way accumulator [5,7,42,43] based on a Merkle hash tree [39] requiring less signature verifications than LTT.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Golle and Modadugu (2001) and Miner and Staddon (2001) proved other bounds based on augmented chains. Al-ibrahim and Pieprzyk (2001) used linear equations and polynomial interpolation whereas Pannetrat and Molva (2002) proposed some erasure codes to achieve signature dispersion. Gao and Yao (2005) proposed to use an online/off-line signature (Even et al, 1989) to sign the first stream packet.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless large-scale broadcasts prevent lost content from being redistributed since the lost of any piece of data could generate a prohibitive number of redistribution requests at the sender. Furthermore, the channel can be under the control of adversaries performing malicious actions on the data stream 1 . Thus the security of multicast protocols relies on two aspects: the opponents' computational powers and the network properties.…”
Section: Introductionmentioning
confidence: 99%