### A Tree-based Model of Unicast Stream Authentication

Goce Jakimoski and Yvo Desmedt

##### Abstract

When proving the security of a message authentication scheme, the messages are considered to be atomic objects. Straightforward application of such schemes to some information resources may introduce security flaws. Gennaro and Rohatgi (Crypto '97) identified the streams of data as an important class of information resources that can not be considered to be message-like, and they proposed a solution to the problem of stream signing when the stream is not known in advance. The disadvantage of digital signing streams of data is that it is not efficient when non-repudiation is not important, as in the case of point-to-point communications. We present several schemes and also a family of schemes for stream authentication in a unicast setting. Since many authentication schemes have been broken, we will prove our solutions.

Available format(s)
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
stream authenticationMACsstream signaturesunforgeability
Contact author(s)
jakimosk @ cs fsu edu
History
Short URL
https://ia.cr/2006/089

CC BY

BibTeX

@misc{cryptoeprint:2006/089,
author = {Goce Jakimoski and Yvo Desmedt},
title = {A Tree-based Model of Unicast Stream Authentication},
howpublished = {Cryptology ePrint Archive, Paper 2006/089},
year = {2006},
note = {\url{https://eprint.iacr.org/2006/089}},
url = {https://eprint.iacr.org/2006/089}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.