Abstract
We present a multimedia content delivery system that preserves the end-to-end authenticity of original content while allowing content adaptation by intermediaries. Our system utilizes a novel multi-hop signature scheme using Merkle trees that permits selective element removal and insertion. To permit secure element insertion we introduce the notion of a placeholder. We propose a computationally efficient scheme to instantiate placeholders based on the hash-sign-switch paradigm using trapdoor hash functions. We developed a system prototype in which the proposed signature scheme is implemented as an extension of the W3C XML signature standard and is applied to content meta-data written in XML. Evaluation results show that the proposed scheme improves scalability and response time of protected adaptive content delivery systems by reducing computational overhead for intermediaries to commit to the inserted clement by 95% compared to schemes that use conventional digital signatures.
Chapter PDF
Similar content being viewed by others
References
NTT DoCoMo i-mode. http://www.nttdocomo.com/corebiz/imode.
M. Etoh and S. Sekiguchi. MPEG-7 enabled digest video streaming over 3G mobile network. 12th International Packet Video Workshop (PV2002), Apr '02.
O. Goldreich, S. Goldwasser, and S. Micali. How to Construct Random Functions. Journal of the ACM, vol. 33, no. 4, 1986, pp 210–217.
C. Gentry, A. Hevia, R. Jain, T. Kawahara, and Z. Ramzan. End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. To Appear in J. Selected Areas of Communication, Ql, 2005.
Microsoft Windows Media 9 Series, http://www.microsoft.com/windows.
Real Networks. RealOne player, http://www.realnetworks.com.
IETF RFC 3238. http://www.ietf.org/rfc/rfc3238.txt.
IETF Open Pluggable Edge Services (OPES) Working Group. http://www.ietf.org/html.charters/opes-charter.html.
IBM alphaWorks XML Security Suite, http://www.alphaworks.ibm.com/tech/.
T. Yuuichi, T. Kaori, O. Takeshi, S. Shinji, and M. Hideo. ASIA: Information Sharing System with Derived Content Restriction Management. IEICE Transactions on Communications (Japanese Edition), vol. 428, pp 1463–1475, Aug '03.
W3C Recommendation. Synchronized Multimedia Integration Language (SMIL 2.0). http://www.w3.org/TR/smil20. Aug '01.
R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. CT-RSA, Lecture Notes in Computer Science, vol. 2271, pp 244–262, 2002.
A. Shamir and Y. Tauman. Improved Online/Offline Signature Schemes. Proc. of Crypto 2001, pp 355–367.
W3C Recommendation. XML-Signature Syntax and Processing. http://www.w3.org/TR/xmldsig-core. Feb'02.
National Institute of Standards and Technology, U.S. Department of Commerce. Secure Hash Standard. Federal Information Processing Standards Publication 180-1, Apr. 1995.
OASIS Committee. eXtensible Access Control Markup Language vl.0. http://www.oasis-open.org. Feb'03.
R. Merkle. Protocols for Public Key Cryptosystems. Proc. of the IEEE Symposium on Security and Privacy, pp 122–134, 1980.
H. Krawczyk and T. Rabin. Chameleon Hashing and Signature. Proc. of NDSS '2000.
D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. Proc. of Eurocrypt '03. LNCS 2656, pp. 416–432.
S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing. 17(2), pp281–308, 1988.
[21] OMA. DRM2.0 Enabler Release, http://www.openmobilealliance.org. Feb '04.
R. Steinfeld, L. Bull and Y. Zheng. Content Extraction Signatures. Proc. of ICISC 2001. LNCS, vol.2288, pp.285–304.
W3C Recommendation. SOAP v 1.2. http://www.w3.org/TR/SOAP. June '03.
W3C Recommendation. XSL Transformations vl.0. http://www.w3.org/TR/xslt. Nov '99.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Suzuki, T., Ramzan, Z., Fujimoto, H., Gentry, C., Nakayama, T., Jain, R. (2005). A System for End-to-End Authentication of Adaptive Multimedia Content. In: Chadwick, D., Preneel, B. (eds) Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 175. Springer, Boston, MA. https://doi.org/10.1007/0-387-24486-7_18
Download citation
DOI: https://doi.org/10.1007/0-387-24486-7_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24485-3
Online ISBN: 978-0-387-24486-0
eBook Packages: Computer ScienceComputer Science (R0)