{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T18:23:45Z","timestamp":1746815025395,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494621"},{"type":"electronic","value":"9783540494638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935070_7","type":"book-chapter","created":{"date-parts":[[2006,11,13]],"date-time":"2006-11-13T07:25:27Z","timestamp":1163402727000},"page":"108-125","source":"Crossref","is-referenced-by-count":8,"title":["Achieving Multicast Stream Authentication Using MDS Codes"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Tartary","sequence":"first","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-47734-9_24","volume-title":"Networking - ICN 2001","author":"M. Al-Ibrahim","year":"2001","unstructured":"Al-Ibrahim, M., Pieprzyk, J.: Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol.\u00a02094, pp. 239\u2013249. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Alon, N., Edmonds, J., Luby, M.: Linear time erasure codes with nearly optimal recovery (extended abstract). In: 36th Annual Symposium on Foundations of Computer Science, October 1995, pp. 512\u2013519 (1995)","key":"7_CR2","DOI":"10.1109\/SFCS.1995.492581"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1007\/3-540-69053-0_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"N. Bari\u0107","year":"1997","unstructured":"Bari\u0107, N., Pfitzmann, B.: Collision-Free Accumulators and Fail-Stop Signature Schemes without Trees. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 480\u2013494. Springer, Heidelberg (1997)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1007\/3-540-48285-7_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., de Mare, M.: One-Way Accumulators: A Decentralized Alternative to Digital Signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 274\u2013285. Springer, Heidelberg (1994)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIT.2005.864424","volume":"52","author":"A.F. Dana","year":"2006","unstructured":"Dana, A.F., Gowaikar, R., Palanki, R., Hassibi, B., Effros, M.: Capacity of wireless erasure networks. IEEE Transactions on Information Theory\u00a052(3), 789\u2013804 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y., Yung, M.: Multi-receiver\/multi-sender network security: Efficient authenticated multicast\/feedback. In: INFOCOM 1992, vol.\u00a03, pp. 2045\u20132054 (May 1992)","key":"7_CR7","DOI":"10.1109\/INFCOM.1992.263476"},{"key":"7_CR8","volume-title":"Distribution Theory of Runs and Patterns and its Applications","author":"J.C. Fu","year":"2003","unstructured":"Fu, J.C., Lou, W.Y.W.: Distribution Theory of Runs and Patterns and its Applications. World Scientific Publishing, Singapore (2003)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11599371_12","volume-title":"Cryptology and Network Security","author":"C. Gao","year":"2005","unstructured":"Gao, C., Yao, Z.: How to authenticate real time streams using improved online\/offline signatures. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 134\u2013146. Springer, Heidelberg (2005)"},{"unstructured":"Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pp. 13\u201322. Internet Society (February 2001)","key":"7_CR10"},{"key":"7_CR11","volume-title":"List Decoding of Error-Correcting Codes","author":"V. Guruswami","year":"2004","unstructured":"Guruswami, V.: List Decoding of Error-Correcting Codes. Springer, Heidelberg (2004)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/978-3-540-27836-8_59","volume-title":"Automata, Languages and Programming","author":"V. Guruswami","year":"2004","unstructured":"Guruswami, V., Indyk, P.: Linear-time decoding in error-free settings (extended abstract). In: D\u00edaz, J., Karhum\u00e4ki, J., Lepist\u00f6, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol.\u00a03142, pp. 695\u2013707. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Guruswami, V., Rudra, A.: Explicit capacity-achieving list-decodable codes. Technical Report TR05-133, Electronic Colloquium on Computational Complexity (November 2005)","key":"7_CR13","DOI":"10.1145\/1132516.1132518"},{"doi-asserted-by":"crossref","unstructured":"Guruswami, V., Sudan, M.: Improved decoding of Reed-Solomon and algebraic-geometric codes. IEEE Transactions on Information Theory, 1757\u20131767 (May 1999)","key":"7_CR14","DOI":"10.1109\/18.782097"},{"unstructured":"Indyk, P.: List-decoding in linear time. Technical Report TR02-024, Electronic Colloquium on Computational Complexity (April 2002)","key":"7_CR15"},{"unstructured":"Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.D.: Distillation codes and applications to DoS resistant multicast authentication. In: 11th Network and Distributed Systems Security Symposium (NDSS) (February 2004)","key":"7_CR16"},{"issue":"9","key":"7_CR17","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/LCOMM.2004.833807","volume":"8","author":"J. Lacan","year":"2004","unstructured":"Lacan, J., Fimes, J.: Systematic MDS erasure codes based on Vandermonde matrices. IEEE Communications Letters\u00a08(9), 570\u2013572 (2004)","journal-title":"IEEE Communications Letters"},{"key":"7_CR18","volume-title":"Introduction to Finite Fields and their Applications - Revised Edition","author":"R. Lidl","year":"2000","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and their Applications - Revised Edition. Cambridge University Press, Cambridge (2000)"},{"key":"7_CR19","volume-title":"43rd Annual IEEE Symposium on Foundations of Computer Science","author":"M. Luby","year":"2002","unstructured":"Luby, M.: LT codes. In: 43rd Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society, Los Alamitos (2002)"},{"unstructured":"Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast authentication in fully adversarial networks. In: IEEE Symposium on Security and Privacy (November 2003)","key":"7_CR20"},{"key":"7_CR21","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"unstructured":"Maymounkov, P.: Online codes. Technical report, New York University (November 2002)","key":"7_CR22"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"doi-asserted-by":"crossref","unstructured":"Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE Symposium on Security and Privacy, pp. 232\u2013246 (May 2001)","key":"7_CR24","DOI":"10.1109\/SECPRI.2001.924301"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-540-30574-3_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"L. Nguyen","year":"2005","unstructured":"Nguyen, L.: Accumulators from Bilinear Pairings and Applications. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 275\u2013292. Springer, Heidelberg (2005)"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/3-540-60865-6_45","volume-title":"Fast Software Encryption","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K.: Fast accumulated hashing. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol.\u00a01039, pp. 83\u201387. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Pannetrat, A., Molva, R.: Authenticating real time packet streams and multicasts. In: 7th International Symposium on Computers and Communications (July 2002)","key":"7_CR27","DOI":"10.1109\/ISCC.2002.1021720"},{"unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE Symposium on Security and Privacy, pp. 227\u2013240 (May 2002)","key":"7_CR28"},{"key":"7_CR29","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1145\/762476.762480","volume":"6","author":"J.M. Park","year":"2003","unstructured":"Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security\u00a06, 258\u2013285 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/978-3-540-24768-5_86","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"Y. Park","year":"2004","unstructured":"Park, Y., Cho, Y.: The eSAIDA Stream Authentication Scheme. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 799\u2013807. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Paxson, V.: End-to-end Internet packet dynamics. IEEE\/ACM Transactions on Networking, 277\u2013292 (June 1999)","key":"7_CR31","DOI":"10.1109\/90.779192"},{"doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56\u201373 (May 2000)","key":"7_CR32","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"7_CR33","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0229-6","volume-title":"Secure Broadcast Communication in Wired and Wireless Networks","author":"A. Perrig","year":"2003","unstructured":"Perrig, A., Tygar, J.D.: Secure Broadcast Communication in Wired and Wireless Networks. Kluwer Academic Publishers, Dordrecht (2003)"},{"key":"7_CR34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"J. Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Heidelberg (2003)"},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I.S. Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of Society for Industrial and Applied Mathematics\u00a08(2), 300\u2013304 (1960)","journal-title":"Journal of Society for Industrial and Applied Mathematics"},{"doi-asserted-by":"crossref","unstructured":"Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: 6th ACM Conference on Computer and Communications Security, pp. 93\u2013100 (1999)","key":"7_CR36","DOI":"10.1145\/319709.319722"},{"unstructured":"Roth, R.M., Skachek, V.: Improved nearly-MDS expander codes (January 2005), available online at: http:\/\/arxiv.org\/PS_cache\/cs\/pdf\/0601\/0601090.pdf","key":"7_CR37"},{"key":"7_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/BFb0054151","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"R. Safavi-Naini","year":"1998","unstructured":"Safavi-Naini, R., Wang, H.: New results on multi-receiver authentication code. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 527\u2013541. Springer, Heidelberg (1998)"},{"unstructured":"Shokrollahi, A.: Raptor codes. Technical report, Digital Fountain (June 2003)","key":"7_CR39"},{"key":"7_CR40","volume-title":"Cryptography: Theory and Practice","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/11604938_9","volume-title":"Information Security Applications","author":"C. Tartary","year":"2006","unstructured":"Tartary, C., Wang, H.: Efficient multicast stream authentication for the fully adversarial network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 108\u2013125. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. IEEE\/ACM Transactions on Networking\u00a07 (August 1999)","key":"7_CR42","DOI":"10.1109\/90.793005"},{"key":"7_CR43","first-page":"345","volume-title":"IEEE Conference on Computer Communications","author":"M. Yajnik","year":"1999","unstructured":"Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modeling of the temporal dependence in packet loss. In: IEEE Conference on Computer Communications, pp. 345\u2013352. IEEE Press, Los Alamitos (1999)"},{"unstructured":"Zanotti, J.P.: Le code correcteur C.I.R.C., available online at: http:\/\/zanotti.univ-tln.fr\/enseignement\/divers\/chapter3.html","key":"7_CR44"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935070_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T22:52:19Z","timestamp":1736635939000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935070_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494621","9783540494638"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/11935070_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}