Stream Authentication Using Trapdoor Hash Function
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 9)Publication Date: 2014-09-05
Authors : Dodla Padmaja; P. Srilatha;
Page : 1292-1295
Keywords : Stream authentication; cryptography; content distribution network; trap door functions;
Abstract
Web based services engage distribution of contents like digital audio, video, games, software, stock quotes, Streaming presentations and live news feeds throughout distributed networking technologies, like Content Distribution Networks (CDNs), multicast networks, and peer-to-peer networks. We guard delay sensitive streams against malicious attacks, auditing mechanisms and security mechanisms need to be designed to efficiently process long sequence of bits. We have proposed a novel signature amortization technique based on trapdoor hash functions for authenticating each and every individual data blocks in the stream. Our technique affords for each and every intermediate blocks in the stream we want to stay away from the transmission loss and we will afford constant memory requirements for sender as well as receiver and we want to authenticate and verify the stream to keep away from unauthenticated user and to avoid malicious content.
Other Latest Articles
- An Experimental Study on Economic Feasibility and Strength of Concrete by Partial Replacement of Cement with Hypo Sludge
- Online Anomaly Detection under Over-sampling PCA
- Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks
- Problems and Prospects of Women Entrepreneurship in India
- Low Power, Low Voltage 95.1-dB Linear Variable Gain Amplifier with Diode Connected Load
Last modified: 2021-06-30 21:07:44