Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques

  • Authors:
  • Mohamed Al-Ibrahim;Josef Pieprzyk

  • Affiliations:
  • -;-

  • Venue:
  • ICN '01 Proceedings of the First International Conference on Networking-Part 2
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.