As we mentioned earlier, the receiver needs to be assured that it receives the packet before the corresponding key disclosure packet is sent by the sender. This condition severely limits the transmission rate of the previous two schemes since can only be sent after every receiver has received .
We solve this problem by disclosing the key of the data packet in a later packet , instead of in the following packet, where is a delay parameter that is set by the sender and announced as the session set-up.
The sender determines the delay based on the packet rate , the maximum tolerable synchronization uncertainty , and the maximum tolerable network delay . Setting allows the receiver to successfully verify the security condition even in the case of maximum allowable network delay and maximal synchronization error. The choice of and presents the following tradeoff: Large delay values will cause a large which results in long delays until the packet authentication. On the other hand, short maximum delays cause the the security condition to drop packets at receivers with a slow network connection. However, multimedia data packets become obsolete if they are received after their segment of the stream was already played or presented to the user. In that case, dropping unsafe packets might not interfere with the multimedia stream since the packets are likely to be obsolete. We stress that the choice of does not affect the security of the scheme, only its usability.
For the case of a constant packet rate, the security condition is easy to state. We assume that the sending time of the first packet is and the sending time of packet is . To verify the security condition for an incoming packet, the receiver checks that , where is the arrival time of packet at the receiver.