期刊文献+

一种高效的防窃听和抗污染的安全网络编码方案 被引量:2

An efficient secure network coding scheme against wiretapping and pollution
下载PDF
导出
摘要 针对当前网络编码安全解决方案普遍存在着安全性能不高和缺乏一体化设计等问题,利用网络编码的代数特性和最大距离可分码的设计机理来构造网络安全码和一种信源认证密钥的动态更新技术,实现了一种抗污染和防窃听安全方案,完成了两种安全功能的一体化系统融合。结论表明,与现有多目标安全组合方案相比,该方案不仅具有较低的编码计算复杂度,而且实现了抗共谋和防止代间污染等多种安全性能。 Existing solutions for securing network coding incur either inefficiency in security or integrated design deficiency. To resolve this issue, an efficient network secure code and dynamic design to the source authentication key were constructed by combining the algebraic characteristics of network coding with the maximum distance code design mechanism, and then presented an efficient integrated scheme against wiretapping and pollution attacks. Compared with the simple combination of multi-objective security solutions, the proposed scheme shows to be of lower security complexity, and also has the ability to resist inter-generation pollution and collusion.
作者 刘光军 LIU Guang-jun(School of Information Engineering, Xi ' an University, Xi ' an 710065, China)
出处 《电子设计工程》 2018年第7期21-26,共6页 Electronic Design Engineering
基金 陕西省教育厅专项科研计划项目(15JK2150) 西安市科技计划项目(2016CXWL11 CXY1352WL28 2016CXWL21 2016CXWL22)
关键词 网络编码 污染攻击 窃听 最大距离可分码 network coding pollution attack wiretapping maximum distance separable code
  • 相关文献

参考文献1

二级参考文献18

  • 1Ahlswede R, Cai N, Li S-Y R, et al. Network information flow [J], IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 2Li S Y R, Yeung R W, Cai N. Linear network coding [J]. IEEE Transactions on Information Theory, 2003, 49(2): 37 l- 381.
  • 3Matsuda T, Noguchi T, Takine T. Survey of network coding and its applications [J]. IEICE Transactions on Communica- tions, 2011, E94-B(3): 698-717.
  • 4Medard M, Sprintson A. Network Coding: Fundamentals and Applications [M]. Norwell: Kluwer Academic Press, 2011.
  • 5Ho T, Leong B, Koetter R, et al. Byzantine modiffication detection in multicast networks using randomized network coding [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2803.
  • 6Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: Signature schemes for network coding [C]//Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography. Irvine: Springer-Verlag, 2009: 68-87.
  • 7Cai N, Yeung R W. Secure network coding [C]//Proceedings of International Symposium in Information Theory. Lau-sanne: IEEE Press, 2002: 323.
  • 8Cai N, Chan T. Theory of secure network coding [J]. Proceed- ings of the IEEE. Washington D C: IEEE Press, 2011: 421-437.
  • 9Bhattad K, Narayanan K R. Weakly secure network coding [C] //Proceedings of first Workshop on Network Coding, Theory, and Applications (NetCod05). Riva del Garda: IEEE Press, 2005.
  • 10Silva D, Kschischang F R. Universal secure network coding via rank-metric codes [J]. 1EEE Transactions on Information Theory, 2011, 57: 1124-1135.

共引文献2

同被引文献15

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部