The disadvantage of digital signing streams of data is that it is not efficient when non-repudiation is not important, as in the case of point-to-point communications. We present several schemes and also a family of schemes for stream authentication in a unicast setting. Since many authentication schemes have been broken, we will prove our solutions.
Category / Keywords: secret-key cryptography / stream authentication, MACs, stream signatures, unforgeability Date: received 8 Mar 2006 Contact author: jakimosk at cs fsu edu Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Version: 20060308:193713 (All versions of this report) Discussion forum: Show discussion | Start new discussion