期刊
COMPUTER COMMUNICATIONS
卷 35, 期 1, 页码 48-61出版社
ELSEVIER
DOI: 10.1016/j.comcom.2010.11.004
关键词
Data obfuscation; Fountain code; Privacy homomorphism; Content distribution
资金
- European Commission within the STREP WSAN4CIP
- German BMBF
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment. Compared to conventional 'encrypt - encode/decode - decrypt approaches, our solution is preferable for two reasons: First, it causes less CPU investment for encryption and decryption proportional to the ratio of the payload length to the signaling data length. Second, besides obfuscating the payload data from an eavesdropper, we hide the coding information from an eavesdropper. We evaluate the approach with respect to its application to various data types like MPEG-2 video streams and Java bytecode. (C) 2010 Elsevier B.V. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据