Abstract
We survey several cryptographic algorithms that provide authentication and confidentiality for multimedia traffic over the Internet. We focus in particular on the problem of authenticating streams of data and on the problem of secure multicast, where streamed information is sent to a dynamic group of users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. Operating Systems Review 32(4), 9–20 (1998)
Bergadano, F., Cavagnino, D., Crispo, B.: Individual Source Authentication on the MBONE. In: Proceedings of ICME (2000)
Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of INFOCOM (1999)
Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: Proceedings of the 13th Annual Computer Security Applications Conference (1997)
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)
Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory 46(3) (May 2000)
Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. Information and Computation 165, 100–116 (2001)
Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack. SIAM J. Comp. 17(2), 281–308 (1988)
Lamport, L.: Constructing Digital Signatures from a One-Way Function. Technical Report SRI Intl. CSL 98 (1979)
Merkle, R.: A Digital Signature based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)
National Institute of Standard and Technology. Secure Hash Standard. NIST FIPS Pub 180-1 (1995)
Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient Authentication and Signature of Multicast Streams over Lossy Channels. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)
Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: Proceedings of ACM CCS 1999, pp. 93–100 (1999)
Stinson, D.: Cryptography. Theory and Practice. CRC Press, Boca Raton (1996)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. IETF Draft wallner-key (July 1997), Available from ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt
Wong, C., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: SIGCOMM (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gennaro, R. (2004). Cryptographic Algorithms for Multimedia Traffic. In: Focardi, R., Gorrieri, R. (eds) Foundations of Security Analysis and Design II. FOSAD 2001. Lecture Notes in Computer Science, vol 2946. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24631-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-24631-2_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20955-3
Online ISBN: 978-3-540-24631-2
eBook Packages: Springer Book Archive