Abstract
Providing authentication protocols for real time streams is a challenging task. This is because the authentication rate is very important for real time streams, whereas it is usually a bottleneck. Using improved online/offline signatures and hash chain techniques as tools, our proposed protocol greatly reduces the online computational and communicational cost and thus is more applicable to authenticate real time streams.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 62–73. ACM Press, New York (1993)
Diffie, W., Hellman, M.E.: Multiuser cryptographic techniques. In: Proc. AFIPS 1976 National Computer Conference, Montvale, N.J. AFIPS, pp. 109–112 (1976)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469–472 (1985)
Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263–275. Springer, Heidelberg (1990)
Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proc. 19th ACM Symp. on Theory of Computing, May 1987, pp. 210–217 (1987)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281–308 (1988); Special issue on cryptography
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), San Diego, CA, February 2001, pp. 13–22. Internet Society (2001)
Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2000), San Diego, CA, February 2000, pp. 143–154. Internet Society (2000)
Lamport, L.: Constructing digital signatures from a one-way function. Technical Report CSL 1998, SRI International (October 1979)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, pp. 42–44 (1987)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, pp. 232–246. IEEE Computer Society, Los Alamitos (2001); Technical Committee on Security and Privacy
National Bureau of Standards. Digital signature standard. Technical Report FIPS Publication 186, National Bureau of Standards (1994)
Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: NDSS (2003)
Perrig, A., Canetti, R., Tygar, D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2000. IEEE Computer Society Press, Los Alamitos (2000)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56–73 (2000)
Rabin, M.O.: Digitalized signatures. In: Foundations of Secure Computation, pp. 155–168. Academic Press, London (1978)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 355–367. Springer, Heidelberg (2001)
Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. In: IEEE ICNP 1998 (1998)
Wu, Y., Ma, D., Xu, C.: Efficient object-based stream authentication. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 354–367. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gao, Cz., Yao, Za. (2005). How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_12
Download citation
DOI: https://doi.org/10.1007/11599371_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30849-2
Online ISBN: 978-3-540-32298-6
eBook Packages: Computer ScienceComputer Science (R0)