Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation165 (1):100-116,2001.Type:Article
Date Reviewed: Dec 1 2001

The authors present methods to cryptographically sign finite and infinite length digital streams while reducing computational requirements of previous methods. The authors divide the stream into blocks and embed the signing information in the stream itself such that signing the information in the ith block can be used to authenticate the (i + 1) block because the signature on the first block will propagate through succeeding blocks (that is, the first block contains a hash of the second block, the second block contains a hash of the third block, and so on). Consequently, verification of succeeding blocks requires only hash computations instead of full signature computations.

The authors describe previous methods for implementing stream-based signatures including similar work and the variations they used to produce their results and a detailed security proof for off-line and on-line implementations. They discuss applications including MPEG video and audio, Java applets, broadcast, long file authentication, and content filtering at proxy servers.

The presentation is well done and appears to provide information useful to cryptographers, who will examine the author’s proof and determine whether the proposed method can be readily broken. If the methods described are secure, they appear to simplify the computational requirements for signing streaming information and could have significant benefits for several important applications.

Reviewer:  Robert E. Mahan Review #: CR125569 (0112-0469)
Bookmark and Share
 
Authentication (K.6.5 ... )
 
 
Hash-Table Representations (E.2 ... )
 
 
Coding And Information Theory (E.4 )
 
 
Data Storage Representations (E.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
Authentication: from passwords to public keys
Smith R., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 2002.  549, Type: Book (9780201615999)
Oct 3 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy