DocumentCode :
1311745
Title :
Authentication of Digital Streams
Author :
Tartary, Christophe ; Wang, Huaxiong ; Ling, San
Author_Institution :
Inst. for Theor. Comput. Sci. within the Inst. for Interdiscipl. Inf. Sci., Tsinghua Univ., Beijing, China
Volume :
57
Issue :
9
fYear :
2011
Firstpage :
6285
Lastpage :
6303
Abstract :
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. Recently, many coding theory based protocols have been developed to treat the stream authentication problem over such a channel. In this paper, our goal is to provide a general coding approach for multicast stream authentication. We design an authentication protocol which combines any list recoverable code (provided some conditions on its construction parameters). We demonstrate that the previous schemes can be viewed as instances of our construction when a Reed-Solomon code is used as a list recoverable code. In such settings, we also show that our approach leads to a better upper bound on the number of signature verification queries for each receiver.
Keywords :
Reed-Solomon codes; channel coding; cryptographic protocols; digital signatures; handwriting recognition; multicast communication; telecommunication channels; video streaming; Reed-Solomon code; coding theory; communication channel; data packet; digital stream authentication problem; multicast stream authentication problem; recoverable code; signature verification; Algorithm design and analysis; Authentication; Decoding; Polynomials; Protocols; Receivers; Adversarial network; list recoverable codes; polynomial reconstruction problem; stream authentication;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2011.2161960
Filename :
6006616
Link To Document :
بازگشت