期刊文献+

基于RSA的多源网络编码签名方案 被引量:2

RSA-based signature scheme for multi-source network coding
下载PDF
导出
摘要 由于网络编码极易遭受污染攻击的破坏,文中基于RSA问题的难解性提出了一种适用于多源网络编码同态签名方案,以应对污染攻击和重放攻击。该方案能够阻止恶意修改的数据分组,被污染的数据分组会被验证者丢弃,从而保证了系统的安全性。由于方案是为多源网络编码设计的,不需要额外的安全信道,且采用线性计算,大大降低了对结点计算能力的要求,节省了结点的验证时间。此外,通过引入消息代序号,该方案可以防止代间重放攻击。 Because network coding is very vulnerable to pollution attacks,a novel homomorphic signature for multi-source network coding scheme based on the difficulty of RSA problem is proposed in the paper.It is to prevent pollution attacks and replay attacks.This scheme can prevent malicious modification of data packets and polluted data packets will be discarded by the verifier to ensure the security of the system.Our scheme is specially designed for multi-source network coding.It does not need any extra secure channel and uses the linear calculations,so it greatly reduces the requirements of computing power of the node and the verification time of the node.In addition,the scheme can prevent replay attacks by using the serial number of the message generation.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第5期1752-1756,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61063041)
关键词 网络编码 多源 同态签名 污染攻击 重放攻击 network coding multi-source homomorphic signature pollution attack replay attack
  • 相关文献

参考文献19

  • 1Krohn M N, Frenmn M J, Mazieres D. On the-fly verification of rateless erasure codes for efficient content distribution [C]. IEEE Symposium on Security and Privacy, 2004: 226 -240.
  • 2ZHAO F, Kalker T, Medared M. Signature for content distribu- tion with network coding [C]. IEEE International. Symposium on Information Theory. Washington, EC: IEEE, 2007:556- 560.
  • 3Boneh D, Freeman D, Katz J, et al. Signing a linear sub- space.. Signature schemes for network coding [G]. LNCS 5443: Public-Key Cryptography. Springer, 2009.. 68-87.
  • 4YAN Wen@e, YANG Ming-xi, LI La-yuan, et al. Short sig- natures for Multi-source network coding [C]. International Conference on Multimedia Information Networking and Securi- ty, 2009: 458-462.
  • 5杨铭熙,罗蛟,李腊元.多源网络编码签名[J].China Communications,2010,7(1):131-137. 被引量:8
  • 6Johnson R, Molnar D, Song D, et al. Homomorphic signa ture schemes [G]. LNCS 2271: Topic in CryptologyCT RSA. Springer, 2002: 244-262.
  • 7Charles D, Jain K, LAUTER K. Signatures for network coding [C]. 40th Annual Conference on Information Sciences and Svstems, 2006: 857-863.
  • 8Gennaro R, Katz J, Krawczyk H, et al. Secure network coding over the integers [G]. LNCS 6056 Public Key Cryp- tography. Springer, 2010: 142-160.
  • 9Katz J, Waters B. Compact signatures for network coding [EB/OL]. http: //www. cs. umd. edu/~jkatz/papers/net- workcdingsigs, pdf, 2008.
  • 10Boneh D, Freeman D. Homomorphic signatures over binary fields Secure network coding with smaU coefficients [C]. Stanford University, USA Crypto 2010 Rump Session 17, 2010.

二级参考文献16

  • 1Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology—Eurocrypt2003,International Conference on the Theory and Applications of Cryptographic Techniques . 2003
  • 2Ahlswede R,Cai N,Li S Y R,et al.Network information flow. IEEE Transactions on Information Theory . 2000
  • 3Boneh D,Lynn B,Shacham H.Short Signatures from the Weil Pairing. Advances in Cryptology-Asiacrypt’2001 . 2001
  • 4Li S R,Yeung R W,Cai Ning.Linear network coding. IEEE Transactions on Information Theory . 2003
  • 5T.Ho,R.Koetter,M.Medard,D.Karger,M.Effros.The Benefits of Coding over Routing in a Randomized Setting. Information Theory,2003.Proceedings.IEEE International Symposium on . 2003
  • 6Ho T,Koetter R,Medard M, et al.Toward a random operation of networks. IEEE Transactions on Information Theory . 2004
  • 7Chou P A,Wu Y,Jain K.Practical Network Coding. 41st Allerton Conference on Communication,Control,and Computing . 2003
  • 8Cai N,Yeung R W.Secure Network Coding. http://personal.ie.cuhk.edu.hk/~ITIP/ISIT02/secure.ps . 2001
  • 9Krohn M N,Freedman M J,Mazieres D.On-the-fly verification of rateless erasure codes for efficient content distribution. IEEE Symposium on Security and Privacy . 2004
  • 10M.Bellare,O.Goldreich,S.Goldwasser.Incremental Cryptography:The Case of Hashing and Signing. CRYPTO’94 . 1994

共引文献7

同被引文献18

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部