Trapdoor Hash Based Signature Amortization Technique to Authenticate

Bruntha M*, **
* M.E Scholar, Department of Information Technology in Kongu Engineering College
** Professor Kongu Engineering College
Periodicity:September - November'2013
DOI : https://doi.org/10.26634/jit.2.4.2539

Abstract

A Content Distribution Network (CDN) is a collection of large number of server deployed in different area across the internet. CDN serves end-users with high availability of content and high performance. It mainly supports application like ecommerce, live digital streaming media, on demand streaming media, etc. In such application end-users involve with very low data rate, varying communication overhead, low tolerance for high latency. The existing work uses a single signing/verification operation by chaining technique for signing/verifying multiple packets. The signature is generated using Feige Fiat Shamir signature scheme. In proposed work a security mechanism known as Trapdoor hash based signature amortization technique is implemented. This authenticates individual data blocks in a stream and the signature is generated using DL-SA signature scheme. The proposed technique provide high tolerance for loss of intermediate blocks, higher signing and verification rate, limited communication overhead.

Keywords

Signature Amortization, Trapdoor Hash Function, Content Distribution, Digital Signature.

How to Cite this Article?

Bruntha, M., and Premalatha, J. (2013). Trapdoor Hash based Signature Mortization Technique to Authenticate delay Sensitive Streams. i-manager’s Journal on Information Technology, 2(4), 10-15. https://doi.org/10.26634/jit.2.4.2539

References

[1]Shamir and Y. Tauman, (2001). “Improved Online/Offline Signature Schemes,” CRYPTO '01: Proc. 21st Ann. Int'l Cryptology Conf., pp. 355-367,
[2]. C.K. Wong and S.S. Lam, (1999). “Digital Signatures for Flows and Multicasts,” IEEE/ACM Trans. Networking, Vol. 7, No. 4, pp. 502-513, Aug.
[3]. C.-P. Schnorr, (1991). “Efficient Signature Generation by Smart Cards,”J. Cryptology, Vol. 4, No. 3, pp. 161-174,
[4]. P. Rohatgi, (1999). “A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 93-100,
[5]. X. Chen, F. Zhang, H. Tian, B. Wei, W. Susilo, Y. Mu, H. Lee, and K. Kim, (2008). “Efficient Generic Online/Offline (Threshold) Signatures without Key Exposure,” Information Sciences, Vol. 178, No. 21, pp.4192-203,
[6]. L. Harn, W.-J. Hsin, and C. Lin, (2010). “Efficient Online/Offline Signature Schemes Based on Multiple- Collision Trapdoor Hash Families,” The Computer J., Vol. 53, No. 9, pp. 1478-1484,
[7]. S. Micali and A. Shamir, (1990). An improvement on the Fiat-Shamir identifi-cation and signature scheme, in Advances in Cryptology CRYPTO'88, pp. 244±247.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.