next up previous
Next: Threat Model and security Up: Efficient Authentication and Signing Previous: Introduction

TESLA: Timed Efficient Stream Loss-tolerant Authentication

 

In this section, we describe five schemes for stream authentication. Each scheme builds up on the previous one and improves it to solve its shortcomings. Finally, scheme V, which we call TESLA(short for Timed Efficient Stream Loss-tolerant Authentication), satisfies all the properties we listed in the introduction. The cryptographic primitives used in this section are reviewed in Appendix A, which also contains a sketch of a security analysis for our scheme.

We use the following notation: x,y denotes the concatenation of x and y, S stands for sender, and R stands for receiver. A stream S is divided into chunks Mi (which we also call messages), S = M1, M2, &ldots;, Ml. Each message Mi is sent in a packet Pi, along with additional authentication information.




next up previous
Next: Threat Model and security Up: Efficient Authentication and Signing Previous: Introduction

Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000