Skip to main content

2018 | OriginalPaper | Buchkapitel

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding

verfasst von : Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang

Erschienen in: Advances in Internetworking, Data & Web Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network coding is now widely used to improve the network throughput capacity in lots of applications, such as distributed storage, wireless mesh networks, etc. Unlike the traditional routing scheme in which the network nodes simply relay the received packets, network coding technique requires the intermediate node to combine the received packets together and then re-transmit it repeatedly. However, there is a fatal threat that the malicious intermediate nodes can tamper the data before combining the packets, and thus the standard signature scheme cannot satisfy the security requirement for this application. In this paper, we propose an identity-based homomorphic scheme for network coding which can prevent malicious nodes to produce the pollution attacks. The public key of our scheme is a constant size which is only the hash output of user’s identity. We present the detailed construction and analyze the security of the scheme in the random oracle model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptology 22(1), 1–61 (2009)MathSciNetCrossRefMATH Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. J. Cryptology 22(1), 1–61 (2009)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: signature schemes for network coding. In: International Workshop on Public Key Cryptography, pp. 68–87. Springer (2009) Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: signature schemes for network coding. In: International Workshop on Public Key Cryptography, pp. 68–87. Springer (2009)
4.
Zurück zum Zitat Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 857–863. IEEE (2006) Charles, D., Jain, K., Lauter, K.: Signatures for network coding. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 857–863. IEEE (2006)
6.
Zurück zum Zitat Choon, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: International Workshop on Public Key Cryptography, pp. 18–30. Springer (2003) Choon, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: International Workshop on Public Key Cryptography, pp. 18–30. Springer (2003)
7.
Zurück zum Zitat Dai, M., Kwan, H.Y., Sung, C.W.: Linear network coding strategies for the multiple access relay channel with packet erasures. IEEE Trans. Wireless Commun. 12(1), 218–227 (2013)CrossRef Dai, M., Kwan, H.Y., Sung, C.W.: Linear network coding strategies for the multiple access relay channel with packet erasures. IEEE Trans. Wireless Commun. 12(1), 218–227 (2013)CrossRef
9.
Zurück zum Zitat Esmaeilzadeh, M., Sadeghi, P., Aboutorab, N.: Random linear network coding for wireless layered video broadcast: general design methods for adaptive feedback-free transmission. IEEE Trans. Commun. 65(2), 790–805 (2017)CrossRef Esmaeilzadeh, M., Sadeghi, P., Aboutorab, N.: Random linear network coding for wireless layered video broadcast: general design methods for adaptive feedback-free transmission. IEEE Trans. Commun. 65(2), 790–805 (2017)CrossRef
10.
Zurück zum Zitat Gorbunov, S., Vaikuntanathan, V., Wichs, D.: Leveled fully homomorphic signatures from standard lattices. In: Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pp. 469–477. ACM (2015) Gorbunov, S., Vaikuntanathan, V., Wichs, D.: Leveled fully homomorphic signatures from standard lattices. In: Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, pp. 469–477. ACM (2015)
11.
Zurück zum Zitat Han, K., Ho, T., Koetter, R., Medard, M., Zhao, F.: On network coding for security. In: Military Communications Conference 2007, MILCOM 2007, pp. 1–6. IEEE (2007) Han, K., Ho, T., Koetter, R., Medard, M., Zhao, F.: On network coding for security. In: Military Communications Conference 2007, MILCOM 2007, pp. 1–6. IEEE (2007)
12.
Zurück zum Zitat Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient network coding in the presence of byzantine adversaries. In: INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp. 616–624. IEEE (2007) Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient network coding in the presence of byzantine adversaries. In: INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp. 616–624. IEEE (2007)
13.
Zurück zum Zitat Jain, K., Lovasz, L., Chou, P.A.: Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding. Distrib. Comput. 19(4), 301–311 (2007)CrossRefMATH Jain, K., Lovasz, L., Chou, P.A.: Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding. Distrib. Comput. 19(4), 301–311 (2007)CrossRefMATH
14.
Zurück zum Zitat Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., Crowcroft, J.: Xors in the air: practical wireless network coding. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 243–254. ACM (2006) Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., Crowcroft, J.: Xors in the air: practical wireless network coding. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 243–254. ACM (2006)
15.
Zurück zum Zitat Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of 2004 IEEE Symposium on Security and Privacy 2004, pp. 226–240. IEEE (2004) Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of 2004 IEEE Symposium on Security and Privacy 2004, pp. 226–240. IEEE (2004)
17.
Zurück zum Zitat Li, Z., Li, B.: Network coding: the case of multiple unicast sessions. In: Allerton Conference on Communications, vol. 16, p. 8 (2004) Li, Z., Li, B.: Network coding: the case of multiple unicast sessions. In: Allerton Conference on Communications, vol. 16, p. 8 (2004)
18.
Zurück zum Zitat Lun, D.S., Médard, M., Koetter, R.: Network coding for efficient wireless unicast. In: 2006 International Zurich Seminar on Communications, pp. 74–77. IEEE (2006) Lun, D.S., Médard, M., Koetter, R.: Network coding for efficient wireless unicast. In: 2006 International Zurich Seminar on Communications, pp. 74–77. IEEE (2006)
19.
Zurück zum Zitat Petrovic, D., Ramchandran, K., Rabaey, J.: Overcoming untuned radios in wireless networks with network coding. IEEE Trans. Inf. Theory 52(6), 2649–2657 (2006)MathSciNetCrossRefMATH Petrovic, D., Ramchandran, K., Rabaey, J.: Overcoming untuned radios in wireless networks with network coding. IEEE Trans. Inf. Theory 52(6), 2649–2657 (2006)MathSciNetCrossRefMATH
20.
Zurück zum Zitat Swapna, B., Eryilmaz, A., Shroff, N.B.: Throughput-delay analysis of random linear network coding for wireless broadcasting. IEEE Trans. Inf. Theory 59(10), 6328–6341 (2013)MathSciNetCrossRef Swapna, B., Eryilmaz, A., Shroff, N.B.: Throughput-delay analysis of random linear network coding for wireless broadcasting. IEEE Trans. Inf. Theory 59(10), 6328–6341 (2013)MathSciNetCrossRef
21.
Zurück zum Zitat Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 1409–1417. IEEE (2008) Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: The 27th Conference on Computer Communications, INFOCOM 2008, pp. 1409–1417. IEEE (2008)
22.
Zurück zum Zitat Zhao, F., Kalker, T., Médard, M., Han, K.J.: Signatures for content distribution with network coding. In: IEEE International Symposium on Information Theory 2007, ISIT 2007, pp. 556–560. IEEE (2007) Zhao, F., Kalker, T., Médard, M., Han, K.J.: Signatures for content distribution with network coding. In: IEEE International Symposium on Information Theory 2007, ISIT 2007, pp. 556–560. IEEE (2007)
23.
Zurück zum Zitat Zhu, Y., Li, B., Guo, J.: Multicast with network coding in application-layer overlay networks. IEEE J. Sel. Areas Commun. 22(1), 107–120 (2004)CrossRef Zhu, Y., Li, B., Guo, J.: Multicast with network coding in application-layer overlay networks. IEEE J. Sel. Areas Commun. 22(1), 107–120 (2004)CrossRef
24.
Zurück zum Zitat Zkik, K., Tebaa, M., El Hajji, S.: A new secure framework in mcc using homomorphic signature: application in banking data. In: Transactions on Engineering Technologies, pp. 413–427. Springer (2016) Zkik, K., Tebaa, M., El Hajji, S.: A new secure framework in mcc using homomorphic signature: application in banking data. In: Transactions on Engineering Technologies, pp. 413–427. Springer (2016)
Metadaten
Titel
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
verfasst von
Yudi Zhang
Yan Jiang
Bingbing Li
Mingwu Zhang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-59463-7_52

Premium Partner