International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Stream Authentication Using Trapdoor Hash Function

Dodla Padmaja | P. Srilatha [3]


Abstract: Web based services engage distribution of contents like digital audio, video, games, software, stock quotes, Streaming presentations and live news feeds throughout distributed networking technologies, like Content Distribution Networks (CDNs), multicast networks, and peer-to-peer networks. We guard delay sensitive streams against malicious attacks, auditing mechanisms and security mechanisms need to be designed to efficiently process long sequence of bits. We have proposed a novel signature amortization technique based on trapdoor hash functions for authenticating each and every individual data blocks in the stream. Our technique affords for each and every intermediate blocks in the stream we want to stay away from the transmission loss and we will afford constant memory requirements for sender as well as receiver and we want to authenticate and verify the stream to keep away from unauthenticated user and to avoid malicious content.


Keywords: Stream authentication, cryptography, content distribution network, trap door functions


Edition: Volume 3 Issue 9, September 2014,


Pages: 1292 - 1295


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Dodla Padmaja, P. Srilatha, "Stream Authentication Using Trapdoor Hash Function", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1292-1295, https://www.ijsr.net/get_abstract.php?paper_id=SEP14343

Similar Articles with Keyword 'cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top