(Strange; this message was sent on May 18th, but I just received it
on June 12th.)
On May 18, 2006, at 9:31 AM, Luigi De Donà wrote:
Hi all,
I would like to use a type of Merkle Hash Trees for verifying the
integrity
of a live stream delivered using an application level multicast
distribution
tree.
I found a bunch of academic work related to this topic under the
keyword "multicast data origin authentication". Several of the
proposed techniques use hash chaining.
http://citeseer.ist.psu.edu/challal04taxonomy.html
http://citeseer.ist.psu.edu/723894.html
It may also be worth using ECC instead of RSA/DSA to sign the Merkle
tree roots for better performance.
I haven't heard of any P2P systems that use such techniques, so good
luck.
Wes Felter - [EMAIL PROTECTED] - http://felter.org/wesley/
_______________________________________________
p2p-hackers mailing list
[email protected]
http://zgp.org/mailman/listinfo/p2p-hackers
_______________________________________________
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences