Chained Stream Authentication

  • Authors:
  • Francesco Bergadano;Davide Cavagnino;Bruno Crispo

  • Affiliations:
  • -;-;-

  • Venue:
  • SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a protocol for the exchange of individually authenticated data streams among N parties. Our authentication procedure is fast, because it only requires the computation of hash functions - we do not need digital signatures, that are substantially less efficient. The authentication information is also short: two hash values for every block of data. Since there are no shared secrets, this information does not grow with N, the number of parties.