Skip to main content
Top
Published in: Cluster Computing 5/2019

06-11-2017

Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem

Authors: Guangzhi Zhang, Shaobin Cai

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The McEliece cryptosystem based on rank-metric codes is presented to offer both security and error-correction simultaneously in random network coding system. In the multicast network, the original messages are encoded with McEliece cryptosystem based on Gabidulin codes. Key distribution will be done one time. The rank codes decoding is performed in the sink. As long as \(t < {d_R}\left( C \right) /2\), the decoding is guaranteed, where t is the number of corrupted packets and \({d_R}\left( C \right) \) is the minimum rank distance of the rank codes C. Original messages are protected based on the cryptosystem. Compared with the rate \(\mathrm{{n}} - \mu - 2t\) in traditional SEC network codes, the rate approaches \(\mathrm{{n}} - 2t\) where \(\mu \) is the number of eavesdroppers. The rate won’t decrease as the number of eavesdropped edges increases.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Du, W.Z., Wang, X.M.: One kind of secret code encryption scheme based on maximum rank distance codes. Chin. J. Comput. 6, 650–653 (2001)MathSciNet Du, W.Z., Wang, X.M.: One kind of secret code encryption scheme based on maximum rank distance codes. Chin. J. Comput. 6, 650–653 (2001)MathSciNet
2.
go back to reference Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a non-commutative ring and their application in cryptology. Springer, Berlin (1991)CrossRef Gabidulin, E.M., Paramonov, A.V., Tretjakov, O.V.: Ideals over a non-commutative ring and their application in cryptology. Springer, Berlin (1991)CrossRef
3.
go back to reference Gibson, J.K.: Severely denting the gabidulin version of the mceliece public key cryptosystem. Des. Codes Cryptogr. 6(1), 37–45 (1995)MathSciNetCrossRef Gibson, J.K.: Severely denting the gabidulin version of the mceliece public key cryptosystem. Des. Codes Cryptogr. 6(1), 37–45 (1995)MathSciNetCrossRef
4.
go back to reference Islam, M.S., Kim, J.M.: Gpu-based fast error recovery for high speed data communication in media technology. Clust. Comput. 18(1), 93–101 (2015)CrossRef Islam, M.S., Kim, J.M.: Gpu-based fast error recovery for high speed data communication in media technology. Clust. Comput. 18(1), 93–101 (2015)CrossRef
5.
go back to reference Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Medard, M.: Resilient network coding in the presence of byzantine adversaries. In: INFOCOM 2007. IEEE International Conference on Computer Communications, pp. 616–624. IEEE (2007) Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Medard, M.: Resilient network coding in the presence of byzantine adversaries. In: INFOCOM 2007. IEEE International Conference on Computer Communications, pp. 616–624. IEEE (2007)
6.
go back to reference Kliazovich, D., Bouvry, P., Khan, S.U.: Dens: data center energy-efficient network-aware scheduling. Clust. Comput. 16(1), 65–75 (2013)CrossRef Kliazovich, D., Bouvry, P., Khan, S.U.: Dens: data center energy-efficient network-aware scheduling. Clust. Comput. 16(1), 65–75 (2013)CrossRef
7.
go back to reference Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Theor. 4244, 114–116 (1978) Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Theor. 4244, 114–116 (1978)
8.
go back to reference Oliveira, P.F., Barros, J.: A network coding approach to secret key distribution. IEEE Trans. Inf. Forensics Secur. 3(3), 414–423 (2008)CrossRef Oliveira, P.F., Barros, J.: A network coding approach to secret key distribution. IEEE Trans. Inf. Forensics Secur. 3(3), 414–423 (2008)CrossRef
9.
go back to reference Overbeck, R.: A new structural attack for gpt and variants. In: International Conference on Cryptology in Malaysia, pp. 50–63 (2005) Overbeck, R.: A new structural attack for gpt and variants. In: International Conference on Cryptology in Malaysia, pp. 50–63 (2005)
10.
go back to reference Overbeck, R.: Structural attacks for public key cryptosystems based on gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)MathSciNetCrossRef Overbeck, R.: Structural attacks for public key cryptosystems based on gabidulin codes. J. Cryptol. 21(2), 280–301 (2008)MathSciNetCrossRef
11.
go back to reference Puchinger, S., Wachter-Zeh, A.: Sub-quadratic decoding of gabidulin codes. In: IEEE International Symposium on Information Theory (2016) Puchinger, S., Wachter-Zeh, A.: Sub-quadratic decoding of gabidulin codes. In: IEEE International Symposium on Information Theory (2016)
12.
go back to reference Rashwan, H., Gabidulin, E.M., Honary, B.: Security of the gpt cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)CrossRef Rashwan, H., Gabidulin, E.M., Honary, B.: Security of the gpt cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)CrossRef
13.
go back to reference Silva, D.: On network error correction under a secret key model. In: IEEE International Symposium on Information Theory Proceedings, pp. 2656–2660 (2011) Silva, D.: On network error correction under a secret key model. In: IEEE International Symposium on Information Theory Proceedings, pp. 2656–2660 (2011)
14.
go back to reference Silva, D., Kschischang, F.R.: Security for wiretap networks via rank-metric codes. In: IEEE International Symposium on Information Theory, pp. 176–180 (2007) Silva, D., Kschischang, F.R.: Security for wiretap networks via rank-metric codes. In: IEEE International Symposium on Information Theory, pp. 176–180 (2007)
15.
go back to reference Silva, D., Kschischang, F.R.: On metrics for error correction in network coding. IEEE Trans. Inf. Theor. 55(12), 5479–5490 (2008)MathSciNetCrossRef Silva, D., Kschischang, F.R.: On metrics for error correction in network coding. IEEE Trans. Inf. Theor. 55(12), 5479–5490 (2008)MathSciNetCrossRef
16.
go back to reference Silva, D., Kschischang, F.R.: Universal secure error-correcting schemes for network coding. In: IEEE International Symposium on Information Theory Proceedings, pp. 2428–2432 (2010) Silva, D., Kschischang, F.R.: Universal secure error-correcting schemes for network coding. In: IEEE International Symposium on Information Theory Proceedings, pp. 2428–2432 (2010)
17.
go back to reference Silva, D., Kschischang, F.R., Koetter, R.: A rank-metric approach to error control in random network coding. IEEE Trans. Inf. Theor. 54(9), 3951–3967 (2008)MathSciNetCrossRef Silva, D., Kschischang, F.R., Koetter, R.: A rank-metric approach to error control in random network coding. IEEE Trans. Inf. Theor. 54(9), 3951–3967 (2008)MathSciNetCrossRef
18.
go back to reference Talooki, V.N., Bassoli, R., Lucani, D.E., Rodriguez, J., Fitzek, F.H.P., Marques, H., Tafazolli, R.: Security concerns and countermeasures in network coding based communication systems: a survey. Comput. Netw. 83, 422–445 (2015)CrossRef Talooki, V.N., Bassoli, R., Lucani, D.E., Rodriguez, J., Fitzek, F.H.P., Marques, H., Tafazolli, R.: Security concerns and countermeasures in network coding based communication systems: a survey. Comput. Netw. 83, 422–445 (2015)CrossRef
19.
go back to reference Wang, L., Yang, Z., Xu, L., Yang, Y.: Ncvcs: network-coding-based video conference system for mobile devices in multicast networks. Ad Hoc Netw. 45, 13–21 (2016)CrossRef Wang, L., Yang, Z., Xu, L., Yang, Y.: Ncvcs: network-coding-based video conference system for mobile devices in multicast networks. Ad Hoc Netw. 45, 13–21 (2016)CrossRef
20.
go back to reference Wu, T., Somani, A.K.: Attack monitoring and localization in all-optical networks. Clust. Comput. 9(4), 465–473 (2006)CrossRef Wu, T., Somani, A.K.: Attack monitoring and localization in all-optical networks. Clust. Comput. 9(4), 465–473 (2006)CrossRef
21.
go back to reference Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient scheme for securing XOR network coding against pollution attacks. In: INFOCOM, pp. 406–414 (2009) Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient scheme for securing XOR network coding against pollution attacks. In: INFOCOM, pp. 406–414 (2009)
Metadata
Title
Secure error-correcting (SEC) schemes for network coding through McEliece cryptosystem
Authors
Guangzhi Zhang
Shaobin Cai
Publication date
06-11-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1294-5

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner