An important requirement of our scheme signature scheme is that the receiver can continuously verify the signature of packets. Clearly, the receiver can only verify the signature once it can trace the authentication links to a signature packet. Hence, the verification delay depends on the frequency and the transmission reliability of signature packets. The signature packet rate depends on the available computation and communication resources. If we use -bit RSA signatures, a dedicated server can compute on the order of signatures per second. The corresponding communication overhead is bytes for the signature plus bytes for each hash included.
We also performed simulations with signature packets. The parameters included
the signature rate, the loss probability of signature packets, and the
number of hashes per signature packet. Figure 11 shows the
sawtooth-shaped verification probability for a stream with packet loss
(bursty loss), the average burst length of dropped packets is , the hash is
split up into chunks of bits each (spanning a maximum length of
packets), hence chunks are necessary to verify a packet, which gives us
bits of the signature. The communication overhead per packet is therefore about
bytes per packet. The signature packets are sent every packets and
they contain -bit hashes of packets, and one -bit RSA digital
signature which amounts to bytes. Each signature packet is sent twice, so
the loss probability of a signature packet is reduced to . The average
per-packet overhead in this case is bytes.
Figure 11: The verification probability for the extended scheme including
periodic signature packets.