CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
In multicast environment, data loss is occurred frequently during transmission, so we should consider the loss in real-time message's authentication. We propose robust loss tolerate scheme. We solve previous studies' disadvantages which are long verifying time and not tolerating error loss in special situation. This mechanism endures to burst and random data loss and provides fast verification time. The analysis are shown that our mechanism is suitable for real-time multicast environment.