Title
A Trapdoor Hash-Based Mechanism for Stream Authentication
Abstract
Digital streaming Internet applications such as online gaming, multimedia playback, presentations, news feeds, and stock quotes involve end-users with very low tolerance for high latency, low data rates, and playback interruption. To protect such delay-sensitive streams against malicious attacks, security mechanisms need to be designed to efficiently process long sequence of bits. We study the problem of efficient authentication for real-time and delay-sensitive streams commonly seen in content distribution, multicast, and peer-to-peer networks. We propose a novel signature amortization technique based on trapdoor hash functions for authenticating individual data blocks in a stream. Our technique provides: 1) Resilience against transmission losses of intermediate blocks in the stream; 2) Small and constant memory/compute requirements at the sender and receiver; 3) Minimal constant communication overhead needed for transmission of authenticating information. Our proposed technique renders authentication of digital streams practical and efficient. We substantiate this claim by constructing {\tt DL}-{\tt SA}, a discrete-log-based instantiation of the proposed technique. {\tt DL}-{\tt SA} provides adaptive stream verification, where the receiver has control over modulating computation cost versus buffer size. Our performance analysis demonstrates that {\tt DL}-{\tt SA} incurs the least per-block communication and signature generation overheads compared to existing schemes with comparable features.
Year
DOI
Venue
2012
10.1109/TDSC.2012.48
Dependable and Secure Computing, IEEE Transactions
Keywords
Field
DocType
content management,cryptography,delays,digital signatures,media streaming,multicast communication,peer-to-peer computing,performance evaluation,constant memory requirements,content distribution,delay-sensitive stream authentication,delay-sensitive streams,digital stream authentication,digital streaming Internet applications,information authentication,intermediate block transmission losses,least per-block communication,long bit sequence,malicious attacks,minimal constant communication overhead,multicast networks,multimedia playback,news feeds,online gaming,peer-to-peer networks,playback interruption,real-time stream authentication,security mechanisms,signature generation overheads,stock quotes,trapdoor hash-based mechanism,Stream authentication,content distribution,cryptography,digital signatures,signature amortization,trapdoor hash functions.
Authentication,Computer science,Cryptography,Server,Computer network,Digital signature,Hash function,Multicast,Content management,The Internet,Distributed computing
Journal
Volume
Issue
ISSN
9
5
1545-5971
Citations 
PageRank 
References 
6
0.45
18
Authors
3
Name
Order
Citations
PageRank
Santosh Chandrasekhar1836.29
Saikat Chakrabarti218821.86
Mukesh Singhal32602259.07