Abstract
We are studying toward several goals necessary to apply digital signature to value-added real time contents to multicast over an insecure and unreliable channel. In this paper we propose a new digital signature framework, called DiffSig, through the first trying to categorize security services that can be achieved by digital signature. DiffSig is able to support equivalent security with smaller key sizes, which results in faster computations and lower transmission overhead. In addition, DiffSig allows a participant to join or leave the communication dynamically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF RFC2401 (November 1998)
RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard (June 2002)
U.S. National Institute of Standards and Technology. Digital Signature Standard (DSS). Federal Register 56. FIPS PUB 186 (August 1991)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Security and Privacy Symposium (2000)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Infocom 1999 (1999)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Wong, C.K., Lam, S.S.: Digital Signatures for Flows and Multicasts. In: Proc. IEEE ICNP 1998 (1998)
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001, February 2001, pp. 13–22 (2001)
Park, J.M., Chong, E.K.P.: Efficient multicast stream authentication using erasure codes. ACM Trans. Inf. Syst. Secur. 6(2), 258–285 (2003)
U.S. National Institute of Standards and Technology. Recommendation for key management. Special Publication 800-57, draft (January 2003)
ISO/IEC 13888-1. Information technology-Security techniques-Non-repudiation- Part 1: General. ISO/IEC JTC1/SC27 (1997)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, April 1980, pp. 122–134 (1980)
Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)
OpenSSL Project, http://www.openssl.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, N., Ruland, C. (2004). DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet Flows. In: Katsikas, S., Lopez, J., Pernul, G. (eds) Trust and Privacy in Digital Business. TrustBus 2004. Lecture Notes in Computer Science, vol 3184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30079-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-30079-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22919-3
Online ISBN: 978-3-540-30079-3
eBook Packages: Springer Book Archive