Signature scheme for network coding against inter-generation pollution attacks
-
摘要: 为适应实时应用的需求,网络编码中引入了代的概念.针对网络编码易受代间污染攻击导致消息发生串扰的问题,提出了基于代标识符的网络编码签名方案.首先,方案中设置了依据代标识符生成的两级私钥,包括代私钥以及在此基础扩展成的消息私钥,以便节点判断消息的代属性来决定是否对它继续进行编码;其次,利用双线性对构造了具有同态性质的签名算法,通过分离两级私钥进行批验证,节点可同时验证同一代的所有消息.最后,通过随机预言模型分析,证明了该方案在适应性选择消息攻击下是安全的.通过开销分析表明方案能有效减少验证开销,提高系统性能.Abstract: The concept of generation is introduced into network coding so as to adapt to the needs of real-time application. Considering that network coding is vulnerable to inter-generation pollution attacks and causes message crosstalk, a generation-identifier based signature scheme for network coding was proposed. Firstly, the two-level private keys, including the generation private key and the message private key, both derived by the generation identifier were set. This procedure enabled nodes to judge the generation attribute of messages and decided whether to continue coding. Secondly, a signature algorithm was constructed with homomorphic property by using the bilinear pairing. Meanwhile the two-level private keys were separated to verify signatures by batch, which made nodes verify all the massages of the same generation simultaneously. Finally, through the analysis of random oracle model, the scheme was proved secure against adaptively chosen message attack. The result indicates that the scheme can reduce computation cost and improve performance of the system.
-
[1] Ahlswede R, Cai N,Li S.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216. [2] He M,Chen L, Wang H,et al.Survey on secure transmission of network coding in wireless networks[C]//International Conference on Computer Science and Service System.Washington,D.C.:IEEE,2012:1216-1219. [3] 曹张华,唐元生. 安全网络编码综述[J].计算机应用,2010,30(2):499-505. Cao Z H,Tang Y S.Survey on secure network coding[J].Journal of Computer Applications,2010,30(2):499-505(in Chinese). [4] Yu Z,Wei Y, Ramkumar B,et al.An efficient signature-based scheme for securing network coding against pollution attacks[C]//Proceedings of International Conference on Computer Communications(INFOCOM).Washington,D.C.:IEEE,2008:1409- 1417. [5] 裴恒利,尚涛, 刘建伟.融合时间戳和同态签名的安全网络编码方法[J].通信学报,2013,34(4):28-35. Pei H L,Shang T,Liu J W.Secure network coding method merged with timestamp and homomorphic signature[J].Journal on Communication,2013,34(4):28-35(in Chinese). [6] Shang T, Pei H L,Liu J W.Secure network coding based on lattice signature[J].China Communication,2014(1):138-151. [7] Chou P A, Wu Y,Jain K.Practical network coding[C]//Proceedings of the Annual Allerton Conference on Communication Control and Computing,2003. [8] Zhao F, Kaller T,Medard M,et al.Signatures for content distribution with network coding[C]//IEEE International Symposium on Information Theory.Washington,D.C.:IEEE,2007:556-560. [9] Kehdi E, Li B.Null keys:limiting malicious attacks via null space properties of network coding[C]//Proceedings of International Conference on Computer Communication(INFOCOM).Washington,D.C.:IEEE,2009:1224-1232. [10] Boneh D, Freeman D,Katz J,et al.Signing a linear subspace:signature schemes for network coding[C]//12th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2009:68-87. [11] Tseng Y M, Wu T Y,Wu J D.Towards efficient ID-based signature schemes with batch verifications from bilinear pairing[C]//International Conference on Availability,Reliability and Security.Washington,D.C.:IEEE,2009:935-940. [12] Camenisch J, Hohenberger S,Pedersent M Q.Batch verification of short signatures[C]//Advances in Cryptology-Eurocrypt 2007.Berlin:Springer,2007:246-263. [13] 黄佳庆,李宗鹏. 网络编码原理[M].北京:国防工业出版社,2012:31. Hang J Q,Li Z P.Network coding principles[M].Beijing:National Defense Industry Press,2012:31(in Chinese). [14] Lee S H, Gerla M,Krawczyk H,et al.Performance evaluation of secure network coding using homomorphic signature[C]//International Symposium on Network Coding(NetCod).Piscataway,NJ:IEEE,2011:1-6. [15] Liu G J, Wang B.Secure network coding against intra/inter-generation pollution attacks[J].Communications,China,2013,10(8):100-110. [16] Boneh D, Franklin M.Identity-based encryption from the Weil pairing[C]//Advances in Cryptology-CRYPTO 2001.Berlin:Springer,2001:213-229.
点击查看大图
计量
- 文章访问数: 1022
- HTML全文浏览量: 136
- PDF下载量: 664
- 被引次数: 0