{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T20:44:16Z","timestamp":1775335456831,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2004.1301326","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"226-240","source":"Crossref","is-referenced-by-count":210,"title":["On-the-fly verification of rateless erasure codes for efficient content distribution"],"prefix":"10.1109","author":[{"given":"M.N.","family":"Krohn","sequence":"first","affiliation":[]},{"given":"M.J.","family":"Freedman","sequence":"additional","affiliation":[]},{"given":"D.","family":"Mazieres","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0054130","article-title":"Fast batch verification for modular exponentiation and digital signatures","author":"bellare","year":"1998","journal-title":"Advances in Cryptology - EUROCRYPT 98"},{"key":"35","article-title":"One-way accumulators: A decentralized alternative to digital sinatures","author":"benaloh","year":"1993","journal-title":"Advances in Cryptology-EUROCRYPT'93"},{"key":"17","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"pedersen","year":"1991","journal-title":"Advances in Cryptology Crypto 91 Proc"},{"key":"36","article-title":"Collision-free accumulators and fail-stop signature schemes without trees","author":"baric?","year":"1997","journal-title":"Advances in Cryptology EUROCRYPT'97 Proceedings"},{"key":"18","article-title":"Cryptographically strong undeniable signatures, unconditionally secure for the signer","author":"chaum","year":"1991","journal-title":"Advances in Cryptology Crypto 91 Proc"},{"key":"33","article-title":"Efficient and secure source authentication for multicast","year":"2001","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"15","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1987","journal-title":"Advances in Cryptology Crypto 87 Proc"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"16","year":"2000","journal-title":"Digital Signature Standard (DSS)"},{"key":"39","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-40061-5_16","article-title":"Accumulating composites and improved group signing","author":"tsudik","year":"2003","journal-title":"Advances in Cryptology - ASIACRYPT-2003"},{"key":"13","year":"1995","journal-title":"Secure Hash Standard"},{"key":"14","article-title":"Distillation codes and applications to DoS resistant multicast authentication","author":"karlof","year":"2004","journal-title":"Proc 10th Ann Network and Distributed System Security Symp (NDSS)"},{"key":"37","article-title":"A new paradigm for collision-free hashing: Incrementality at reduced cost","author":"bellare","year":"1997","journal-title":"Advances in Cryptology EUROCRYPT'97 Proceedings"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945473"},{"key":"38","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45708-9_5","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","author":"camenisch","year":"2002","journal-title":"Advances in Cryptology ? CRYPTO 2002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/263876.263881"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_22"},{"key":"20","article-title":"Digitalized signatures and public key functions as intractable as factorization","volume":"tr 212","author":"rabin","year":"1979","journal-title":"MIT Laboratory for Computer Science Tech Rep"},{"key":"42","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45760-7_17","article-title":"Homomorphic signature schemes","author":"johnson","year":"2002","journal-title":"Progress in Cryptology CT RSA 2002"},{"key":"41","author":"chari","year":"2002","journal-title":"An Efficient Signature Scheme for Route Aggregation"},{"key":"40","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45760-7_16","article-title":"Transitive signature schemes","author":"micali","year":"2002","journal-title":"Progress in Cryptology CT RSA 2002"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.1999.751457","article-title":"Multicast security: A taxonomy and some efficient constructions","author":"canetti","year":"1999","journal-title":"Proc IEEE INFOCOM '99"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052235","article-title":"How to sign digital streams","author":"gennaro","year":"1997","journal-title":"Advances in Cryptology - CRYPTO '97"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1109\/ICNP.1998.723740","article-title":"Digital signatures for flows and multicasts","author":"wong","year":"1998","journal-title":"Proc IEEE International Conference on Network Protocols"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1145\/319709.319722","article-title":"A compact and fast hybrid signature scheme for multicast packet authentication","author":"rohatgi","year":"1999","journal-title":"Proc 6th ACM Conference on Computer and Communication Security (CCS)"},{"key":"26","article-title":"Authenticated streamed data in the presernce of random packet loss","author":"golle","year":"2001","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"27","article-title":"Graph-based authentication of digital streams","author":"miner","year":"2000","journal-title":"Proc IEEE Symposium on Security and Privacy"},{"key":"28","article-title":"Efficient multicast packet authentication","author":"pannetrat","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762480"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258573"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060319"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646178"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749293"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1145\/285237.285258","article-title":"A digital fountain approach to reliable distribution of bulk data","author":"byers","year":"1998","journal-title":"Proc ACM SIGCOMM '98"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"5","article-title":"Raptor codes","volume":"df2003 6 1","author":"shokrollahi","year":"2003","journal-title":"Digital Fountain Inc Tech Rep"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/302350.302353"},{"key":"4","article-title":"Online codes","volume":"2002","author":"maymounkov","year":"2002","journal-title":"NYU Technical Report"},{"key":"9","article-title":"Rateless codes and big downloads","author":"maymounkov","year":"2003","journal-title":"Proc 1st International Workshop on Peer-to-Peer Systems (IPTPS)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633031"}],"event":{"name":"IEEE Symposium on Security and Privacy, 2004. 2004","location":"Berkeley, CA, USA"},"container-title":["IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9120\/28916\/01301326.pdf?arnumber=1301326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T01:48:17Z","timestamp":1624412897000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1301326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/secpri.2004.1301326","relation":{},"subject":[]}}