Signatures for Multi-source Network Coding

被引:0
|
作者
Yang Mingxi [1 ]
Luo Jiao [1 ,2 ]
Li Layuan [1 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Hongxu Informat Inc, Wuhan 430074, Hubei, Peoples R China
关键词
network coding; multi-source; signature; ring signature; homomorphic hash;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network coding can be used to offer benefits in terms of throughput, robustness and wireless resources. However, network coding systems are very vulnerable to pollution attacks. Almost all existing schemes against pollution attacks mainly adopt homomorphic signatures, as far as we know, which are only suitable for the single source network coding scenarios. In this paper, we propose a novel signature scheme for multi-source network coding to prevent pollution attacks. Our signature scheme makes use of the ring signature and homomorphic hash function, in which every source node generates a ring signature for every message sent into networks. The messages from distinct source nodes are combined in the intermediate nodes. The forwarders can generate the ring signatures for their output encoded messages without the secret keys of the source nodes. Polluted messages will be checked out without decoding the combined messages by the verifier. Our scheme is specially designed for multi-source network coding and it is independent of the file or packet size.
引用
收藏
页码:131 / 137
页数:7
相关论文
共 16 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
  • [3] Boneh D., 2003, ADV CRYPTOLOGY EUROC
  • [4] Boneh D, 2001, ADV CRYPTOLOGY ASIAC, P514, DOI [DOI 10.1007/S00145-004-0314-9, 10.1007/s00145-004-0314-9]
  • [5] CAI N, 2001, SECURE NETW CODING
  • [6] Signatures for network coding
    Charles, Denis
    Jain, Kamal
    Lauter, Kristin
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 857 - 863
  • [7] Chou P.A., 2003, Proc. Annual Allerton Conference on Communication control and Computing, V41, P40
  • [8] Ho T, 2003, 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, P442
  • [9] Ho T., 2004, IEEE T INFORM THEORY
  • [10] JOHNSON R, 2002, TOPICS CRYPTOLOLOGY, P204