期刊文献+

单/多源网络编码同态签名方案 被引量:2

Homomorphic signature schemes for single-source and multi-source network coding
下载PDF
导出
摘要 针对单源和多源网络编码污染问题,提出了2种网络编码同态签名方案。单源网络编码椭圆曲线同态签名在椭圆曲线上对消息的散列值进行签名,输出消息、散列值和散列值的签名,接收节点验证签名,该方案通过同态的椭圆曲线签名来抵御代内/间污染。基于双线性对的多源网络编码同态签名不仅能够抵抗污染攻击,而且引入时间戳来抵制网络中的重放攻击。通过随机预言模型下的证明,2种方案在选择性攻击下都是安全的。通过效率分析发现,2种方案都能有效提高验证效率。 To solve the problems of pollution attacks of single-source and multi-source network coding, two homomorphic signature schemes for network coding were proposed. In homomorphic signature for single-source network, the message hash value was signed on the elliptic curve, then the message, hash value and the signature of hash value were output, and the receiving node could verify the signature, the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks. Homomorphic signature from pairings for multi-source network coding could resist pollution attacks, and the introduction of timestamp made it be capable to resist replay attacks. In the random oracle model, it proves that two schemes are all secure under the selective attacks. Analysis shows that two schemes can effectively improve the verification efficiency.
作者 俞惠芳 李雯 YU Huifang;LI Wen(School of Cyberspace Security,Xi’an University of Posts&Telecommunications,Xi’an 710121,China)
出处 《通信学报》 EI CSCD 北大核心 2019年第11期112-121,共10页 Journal on Communications
基金 青海省基础研究计划基金资助项目(No.2016-ZJ-776) 西安邮电大学研究生创新基金资助项目(No.CXJJLY2018077)
关键词 单源网络编码 多源网络编码 同态签名 时间戳 single-source network coding multi-source network coding homomorphic signature timestamp
  • 相关文献

参考文献8

二级参考文献77

  • 1杨铭熙,罗蛟,李腊元.多源网络编码签名[J].China Communications,2010,7(1):131-137. 被引量:8
  • 2华大芳,刘声雷.椭圆曲线加密算法与FPGA硬件实现[J].合肥工业大学学报(自然科学版),2007,30(1):37-40. 被引量:3
  • 3AHLSWEDE R, CAI N, LI S. Network information flow[J]. IEEE Transactions on Information Flow, 2000, 46(4):1204-1216.
  • 4PERVAIZ M, CARDEI M, WU J. Routing security in ad hoc wireless networks[J]. Network Security, 2010, 117-142.
  • 5HO T, LEONG B, KOETTER R. Byzantine modification detection in multicast networks using randomized network coding[A]. Proceedings of IEEE International Symposium on Information Theory(ISIT)[C]. Massachusetts, USA, 2008. 2798-2803.
  • 6GKANTSIDIS C, RODRIGUEZ E Cooperative security for network coding file distribution[A]. Proceedings of International Conference on Computer 367-380. [M)[C]. Barcelona, Spain, 2006.
  • 7MENEZES A, OKAMOTO T, VANSTONE S. Reducing elliptic curve logorithms to logorithms in a finite field[J]. IEEE Transactions on Information Theory, 1993, 39(5):1639-1646.
  • 8YU Z, WEI Y, RAMKUMAR B. An efficient signature-based scheme for secttdng network coding against pollution attacks[A]. Proceedings of International Conference on Computer Communications (INFOCOM)[C]. Arizona, USA, 2008. 1409-1417.
  • 9GENNARO R, KATZ J, KRAWCZYK H. Secure network coding over the integers[J]. Public Key Cryptography, 2010, 60(56):142-160.
  • 10LIM S H, KIM Y H. Noisy network coding[J]. IEEE Transactions on Information Theory, 2011, 57(5):3132-3152.

共引文献31

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部