The Community for Technology Leaders
Green Image
Issue No. 05 - Sept.-Oct. (2012 vol. 9)
ISSN: 1545-5971
pp: 699-713
Santosh Chandrasekhar , University of Kentucky, Lexington
Saikat Chakrabarti , Intel Corporation, Portland
Mukesh Singhal , University of Kentucky, Lexington
Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem of efficient authentication for real-time and delay-sensitive streams commonly seen in content distribution, multicast, and peer-to-peer networks. We propose a novel signature amortization technique based on trapdoor hash functions for authenticating individual data blocks in a stream. Our technique provides: 1) Resilience against transmission losses of intermediate blocks in the stream; 2) Small and constant memory/compute requirements at the sender and receiver; 3) Minimal constant communication overhead needed for transmission of authenticating information. Our proposed technique renders authentication of digital streams practical and efficient. We substantiate this claim by constructing {\tt DL}-{\tt SA}, a discrete-log-based instantiation of the proposed technique. {\tt DL}-{\tt SA} provides adaptive stream verification, where the receiver has control over modulating computation cost versus buffer size. Our performance analysis demonstrates that {\tt DL}-{\tt SA} incurs the least per-block communication and signature generation overheads compared to existing schemes with comparable features.
Authentication, Servers, Media, Receivers, Delay, Real time systems, trapdoor hash functions., Stream authentication, cryptography, content distribution, digital signatures, signature amortization
Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal, "A Trapdoor Hash-Based Mechanism for Stream Authentication", IEEE Transactions on Dependable and Secure Computing, vol. 9, no. , pp. 699-713, Sept.-Oct. 2012, doi:10.1109/TDSC.2012.48
184 ms
(Ver 3.3 (11022016))