Nevertheless our scheme works in such a way that a receiver only needs to get enough packets from a block before verifying it (he does not have to wait for the whole sequence). As the previous scheme, it will be joinable at any block boundary. We need a collision-resistant hash function h as well as a signature scheme (KeyGen, sign, verify) where KeyGen generates the private key SK and its anbsp;...
|Title||:||Information Security Applications|
|Author||:||Jooseok Song, Taekyoung Kwon|
|Publisher||:||Springer - 2006-02-02|