期刊文献+

一种多源网络编码快速签名算法 被引量:1

Fast Signature for Multi-source Network Coding
下载PDF
导出
摘要 针对污染和重放攻击提出一个新的多源网络编码签名算法,利用同态加密算法构造签名方案来抵御污染攻击,通过引入消息代的序号,防止了代间的重放攻击,并且采用线性计算方法来减少节点的验证时间,降低了对结点计算能力的要求,特别适合于无线传感器网络或自组织网络. Because network coding is very vulnerable to pollution attacks, a novel signature scheme for multi-source network coding based on a homomorphic public cryptography is proposed in the paper. This scheme can detect those polluted messages and discard them. What's more, replaying attacks are also infeasible in this scheme by using the serial number of the message generation. This scheme greatly reduces the requirements of computing power of the node and the verification time of the node, so it is efficient and suitable for those scenarios with low computing capability such as mobile Ad hoc networks and wireless sensor networks.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第10期2393-2395,共3页 Journal of Chinese Computer Systems
基金 广东省自然科学基金项目(0002014014)资助
关键词 多源网络编码 同态函数 污染攻击 签名方案 multi-source network coding homomorphic hash function pollution attacks signature scheme
  • 相关文献

参考文献9

  • 1Zhao Fang, Kalker T , Medard M, et al. Signatures for content distribution with network coding [C]. Proc. of IEEE International Symposium on Information Theory, Nice, France ,2007 :556-560.
  • 2BeJlare M, Goldreich 0, Goldwasser S. Incremental cryptography: the case of hashing and signing [C]. Advances in CryptologyCRYPTO '94, August 21-25,1994, Santa Barbara, California, USA, Heidel-berg, Germany : Springer Berlin, 1994 : 216-233.
  • 3朱雪寒,夏卓群,刘品超,谢立通.基于网络编码的ECC验证方案在WSN中的研究[J].计算机技术与发展,2011,21(2):173-176. 被引量:4
  • 4Zhou Ye-jun, Li Hui, Ma Jian-feng, Secure network coding against the contamination and eavesdropping adversaries [EB/OL]. http:// arxiv. org/pdf/0805. 2286 ,2008.
  • 5Jiang Yi-xin,Zhu Hao-jin,Shi Ming-hui,et al. An efficient dynamic-identity based signature scheme for secure network coding [J]. Computer Networks, 2010 ,54 (1): 28-40.
  • 6Yu Z, Wei Y, Ramkumar B, et al. An efficient signature-based scheme for securing network coding against pollution attacks [C]. Proceedings of the Conference of the IEEE Computer and Communications Societies ( INFOCOM) ,2008: 1409-1417.
  • 7Ren Xiao-jing, Lv Min, Xu Yin-long, et al, An efficient scheme against pollution attack in network coding based on redundancy [C]. Proceedings of 2011 IEEE International Conference on Information Theory and Information Security(ICITIS 2011) , VOL02 ,2011.
  • 8Wang Yong-ge. Insecure provably secure network coding and homomorphic authentication schemes for network coding [EB/OL]. http://eprint. iacr. org/20l01060. pdf ,2010.
  • 9Krohn M N, Freedman M J, Mazieres D. On-the-Fly verification of rateless erasure codes for efficient content distribution [C]. IEEE Symposium on Security and Privacy, May 9-12, 2004, Berkeley, California ,2004 : 226-240.

二级参考文献13

  • 1Li S Y R , Yeung R W, Cai N. Linear network coding[ J ]. IEEE Trans. Info. Theory,2003 49(2) :371-381.
  • 2Ahlswede R, Cai N, Li S Y R. et al, NetWork Information Flow [ J ]. IEEE Transaction on Information Theory, 2000,46 (4) : 1204-1216.
  • 3Ho T, Karger D, Medard M, et al. The benefits of coding over routing in a randomized setting[ C]//IEEE International Symposium on Information Theory. Yokohama: [ s. n. ] ,2003.
  • 4Ho T, Medard M. On randomized network coding [ C ]//In: Proceeding of 41st Annual Allerton Conference on Communication Control and Computing. Monticello, IL: [ s. n. ] ,2003.
  • 5IEEE Standard Specifications for Public-Key Cryptography [ S ]. New York: [ s. n. ],2000:146 - 147.
  • 6Lun D S, Medard M,Effros M. On coding for reliable communication over packet networks[ C ]//Conference on Communications , Control and Computing. Allerton : [ s. n. ] ,2004.
  • 7Cai N, Yeung R W. Secure network coding[ C]//In Interna- tional Symposium on Information Theory (ISIT). Lausanne, Switzerland : [ s. n. ] ,2002.
  • 8Krohn M, FreedMan M, Mazieres D. On- the- Fly Verification of Rateless Erasure Codes for Efficient Content Distribution [CJ//IEEE Symposim on Security and Privacy. Berkeley, CA:[s. n. ], 2004.
  • 9Bhattad K, Nayayanan K P. Weakly secure network coding [ C ]//In : Proc. First Workshop on Network Coding, Theory , and Applications (NetCod). Hanover, USA : [ s. n. ] ,2005.
  • 10Ho T, Leong B, Koetter R, et al. Byzantine modification detection in muhicast networks using randomized network coding [ C ]//In International symposium on Information Theory (ISIT). Chicago, USA: [s. n. ] ,2004.

共引文献3

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部