Graph-Based Authentication of Digital Streams

  title={Graph-Based Authentication of Digital Streams},
  author={Sara Miner More and Jessica Staddon},
  journal={IACR Cryptology ePrint Archive},
We consider the authentication of digital streams over a lossy network. The overall approach taken is graph-based, as this yields simple methods for controlling overhead, delay, and the ability to authenticate, while serving to unify many previously known hashand MAC-based techniques. The loss pattern of the network is defined probabilistically, allowing both bursty and random packet loss to be modeled. Our authentication schemes are customizable by the sender of the stream; that is, within… CONTINUE READING
Highly Influential
This paper has highly influenced 17 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 178 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 108 extracted citations

178 Citations

Citations per Year
Semantic Scholar estimates that this publication has 178 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 23 references

and A

  • M. Abdalla, Y. Shavitt
  • Wool.Key Management for Restricted Multicast…
  • 2000
1 Excerpt

Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication

  • P. Rohatgi.A
  • ACM Conference on Computer and Communications…
  • 1999
3 Excerpts


  • R. Canetti, J. Garay, G. Itkis, D. Micciancio
  • Naor and B. Pinkas.Multicast Security: A Taxonomy…
  • 1999
3 Excerpts

Similar Papers

Loading similar papers…