D. Miller, A.S. Ahmadzadeh, and G. Agnew (Canada)
Hash-chaining, signatures, authentication, real-time
For many real-time media streams on the Internet today, it is necessary to provide authentication, data integrity, and non-repudiation. It is important to be able to balance the need for security with the constraints of the environ ment, where data must be delivered in a limited amount of time. This paper develops a novel method of achieving data authentication, based on previous work done in the area of hash-chaining authentication schemes. Theoretical and simulated results are presented, showing that the new method, the modified butterfly scheme, outperforms simi lar schemes such as the butterfly scheme, using the same amount of overhead.
Important Links:
Go Back