How to authenticate real time streams using improved online/offline signatures

  • Authors:
  • Chong-zhi Gao;Zheng-an Yao

  • Affiliations:
  • Information, Machinery and Electronics College, Guangzhou University, GuangZhou, China;College of Mathematic and Computational Science, Sun Yat-Sen University, GuangZhou, China

  • Venue:
  • CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Providing authentication protocols for real time streams is a challenging task. This is because the authentication rate is very important for real time streams, whereas it is usually a bottleneck. Using improved online/offline signatures and hash chain techniques as tools, our proposed protocol greatly reduces the online computational and communicational cost and thus is more applicable to authenticate real time streams.