Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
نویسندگان
چکیده
We use expander graphs to provide eÆcient new constructions for two security applications: authentication of long digital streams over lossy networks and building scalable, r obust overlay networks.Here is a summary of our contributions: (1) To authenticate long digital streams over lossy networks, we provide a construction with a provable lower bound on the ability to authenticate a packet | and that lower bound is independent of the size of the graph. T o achieve this, we present an authentication expander graph with constant degree. (Previous work, such as [MS01], use d authentication graphs but requir ed graphs with degree line ar in the number of vertic es.) (2) T o build eÆcient, robust, and scalable overlay networks, we provide a construction using undirected expander graphs with a provable lower bound on the ability of a br oadc ast message to successfully reach any receiver. This also gives us a new, more eÆcient solution to the decentralized certi cate r evocation problem [WLM00]. This research was suported in part by the Defense Advanced Researc h Projects Agency under D ARPA contract N6601-99-28913 (under supervision of the Space and Naval Warfare Systems Cen ter San Diego), by the National Science foundation under grant FD99-79852, and by the United States P ostal Service under grant USPS 1025 92-01-Z-0236. Views and conclusions contained in this document are those of the authors and do not necessarily represent the oÆcial opinion or policies, either expressed or implied of the US government or any of its agencies, DARPA, NSF, or USPS. ySome of this w ork was done while the author was on leave at the University of California at Berkeley. Supported in part by a David and Lucile Packard F ellowship for Science and Engineering and NSF Grant CCR-9912428.
منابع مشابه
Random Graphs for Peer-to-Peer Overlays
Modern peer-to-peer networks consist of several network layers and distributed algorithms providing features like indexing, ressource balancing, entry protocols, security, anonymity, and cryptography. Since peer-to-peer networks are highly dynamic, a fundamental task in the design of these networks is to provide high connectivity. We propose a solution by distributed random link exchange algori...
متن کاملEfficient Source Authentication for Multicasting in MANETs
1 Abstract— In this paper, we investigate a popular source authentication scheme, TESLA (Timed Efficient Stream Loss-tolerant Authentication) for multicast communication in mobile ad hoc networks. We evaluate the performance of a source authentication scheme inspired from TESLA and TESLA based on simulations. Time synchronization is a crucial assumption made by these schemes. We describe effect...
متن کاملContent-aware authentication of motion JPEG2000 stream in lossy networks
—Stream authentication schemes (SAS) aim to achieve effective authentication of multicast streams over lossy networks. Almost all of the existing SASs are designed for stream data integrity protection only. In this paper, we argue that content integrity protection is more important than data integrity to human users. We present a content-aware SAS in Motion JPEG2000 streaming. In our scheme, a ...
متن کاملBranching Random Walks on Graphs
We study a new distributed randomized information propagation mechanism in networks that we call a branching random walk (BRW). BRW is a generalization of the well-studied “standard” random walk which is a fundamental primitive useful in a wide variety of network applications ranging from token management and load balancing to search, routing, information propagation and gossip. BRW is paramete...
متن کاملData Stream Algorithms via Expander Graphs
We present a simple way of designing deterministic algorithms for problems in the data stream model via lossless expander graphs. We illustrate this by considering two problems, namely, k-sparsity testing and estimating frequency of items.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002