Secure network coding method merged with timestamp and homomorphic signature

被引:6
|
作者
机构
[1] Pei, Heng-Li
[2] Shang, Tao
[3] Liu, Jian-Wei
来源
Pei, H.-L. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
Network security - Codes (symbols) - Wireless networks - Pollution - Authentication;
D O I
10.3969/j.issn.1000-436x.2013.04.004
中图分类号
学科分类号
摘要
A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed. The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of network coding, thus made it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature. The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding and security of the proposed scheme. Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously, and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.
引用
收藏
相关论文
共 50 条
  • [41] Provably Secure Linearly Homomorphic Aggregate Signature Scheme for Electronic Healthcare System
    Gu, Yanyan
    Shen, Limin
    Zhang, Futai
    Xiong, Jinbo
    MATHEMATICS, 2022, 10 (15)
  • [42] A New Secure Framework in MCC Using Homomorphic Signature: Application in Banking Data
    Zkik, Karim
    Tebaa, Maha
    El Hajji, Said
    TRANSACTIONS ON ENGINEERING TECHNOLOGIES, 2016, : 413 - 427
  • [43] A generic homomorphic MAC construction for authentication in network coding
    Wang, Weijia
    Hu, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (02) : 429 - 433
  • [44] A Novel Homomorphic MAC Scheme for Authentication in Network Coding
    Cheng, Chi
    Jiang, Tao
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) : 1228 - 1230
  • [45] Two Improved Homomorphic MAC Schemes in Network Coding
    Li, Xinran
    Fu, Fang-Wei
    Zhao, Xiufeng
    Wang, Guangxia
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 2214 - 2219
  • [46] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416
  • [47] A provably secure blind signature based on coding theory
    Chen, Siyuan
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 376 - 382
  • [48] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 673 - 681
  • [49] Secure Cloud Storage Meets with Secure Network Coding
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    Chow, Sherman S. M.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1936 - 1948
  • [50] Secure network coding from secure proof of retrievability
    Jinyong CHANG
    Bilin SHAO
    Yanyan JI
    Maozhi XU
    Rui XUE
    ScienceChina(InformationSciences), 2021, 64 (12) : 252 - 253