Networking

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

Download Now Free registration required

Executive Summary

It is challenging to provide authentication to time critical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only efficient authentication algorithms to minimize computational cost, but also avoidance of buffering packets so that the data can be immediately processed once being presented. Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks.

  • Format: PDF
  • Size: 996.03 KB