留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

抗代间污染攻击的网络编码签名方案

彭天丽 尚涛 刘建伟

彭天丽, 尚涛, 刘建伟等 . 抗代间污染攻击的网络编码签名方案[J]. 北京航空航天大学学报, 2015, 41(4): 721-726. doi: 10.13700/j.bh.1001-5965.2014.0478
引用本文: 彭天丽, 尚涛, 刘建伟等 . 抗代间污染攻击的网络编码签名方案[J]. 北京航空航天大学学报, 2015, 41(4): 721-726. doi: 10.13700/j.bh.1001-5965.2014.0478
PENG Tianli, SHANG Tao, LIU Jianweiet al. Signature scheme for network coding against inter-generation pollution attacks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(4): 721-726. doi: 10.13700/j.bh.1001-5965.2014.0478(in Chinese)
Citation: PENG Tianli, SHANG Tao, LIU Jianweiet al. Signature scheme for network coding against inter-generation pollution attacks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(4): 721-726. doi: 10.13700/j.bh.1001-5965.2014.0478(in Chinese)

抗代间污染攻击的网络编码签名方案

doi: 10.13700/j.bh.1001-5965.2014.0478
基金项目: 国家973计划资助项目(2012CB315905); 国家自然科学基金资助项目(61272501); Research Promotion Grant-in-Aid for KUT Graduates of Special Scholarship Program; 中央高校基本科研业务费资助项目(YWF14DZXY012)
详细信息
    作者简介:

    彭天丽(1991—),女,重庆人,硕士生,ptianli@aliyun.com

    通讯作者:

    尚涛(1976—),男,辽宁营口人,副教授,shangtao@buaa.edu.cn,研究方向为网络安全、网络编码.

  • 中图分类号: TN918.1

Signature scheme for network coding against inter-generation pollution attacks

  • 摘要: 为适应实时应用的需求,网络编码中引入了代的概念.针对网络编码易受代间污染攻击导致消息发生串扰的问题,提出了基于代标识符的网络编码签名方案.首先,方案中设置了依据代标识符生成的两级私钥,包括代私钥以及在此基础扩展成的消息私钥,以便节点判断消息的代属性来决定是否对它继续进行编码;其次,利用双线性对构造了具有同态性质的签名算法,通过分离两级私钥进行批验证,节点可同时验证同一代的所有消息.最后,通过随机预言模型分析,证明了该方案在适应性选择消息攻击下是安全的.通过开销分析表明方案能有效减少验证开销,提高系统性能.

     

  • [1] Ahlswede R, Cai N,Li S.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216.
    [2] He M,Chen L, Wang H,et al.Survey on secure transmission of network coding in wireless networks[C]//International Conference on Computer Science and Service System.Washington,D.C.:IEEE,2012:1216-1219.
    [3] 曹张华,唐元生. 安全网络编码综述[J].计算机应用,2010,30(2):499-505. Cao Z H,Tang Y S.Survey on secure network coding[J].Journal of Computer Applications,2010,30(2):499-505(in Chinese).
    [4] Yu Z,Wei Y, Ramkumar B,et al.An efficient signature-based scheme for securing network coding against pollution attacks[C]//Proceedings of International Conference on Computer Communications(INFOCOM).Washington,D.C.:IEEE,2008:1409- 1417.
    [5] 裴恒利,尚涛, 刘建伟.融合时间戳和同态签名的安全网络编码方法[J].通信学报,2013,34(4):28-35. Pei H L,Shang T,Liu J W.Secure network coding method merged with timestamp and homomorphic signature[J].Journal on Communication,2013,34(4):28-35(in Chinese).
    [6] Shang T, Pei H L,Liu J W.Secure network coding based on lattice signature[J].China Communication,2014(1):138-151.
    [7] Chou P A, Wu Y,Jain K.Practical network coding[C]//Proceedings of the Annual Allerton Conference on Communication Control and Computing,2003.
    [8] Zhao F, Kaller T,Medard M,et al.Signatures for content distribution with network coding[C]//IEEE International Symposium on Information Theory.Washington,D.C.:IEEE,2007:556-560.
    [9] Kehdi E, Li B.Null keys:limiting malicious attacks via null space properties of network coding[C]//Proceedings of International Conference on Computer Communication(INFOCOM).Washington,D.C.:IEEE,2009:1224-1232.
    [10] Boneh D, Freeman D,Katz J,et al.Signing a linear subspace:signature schemes for network coding[C]//12th International Conference on Practice and Theory in Public Key Cryptography.Berlin:Springer,2009:68-87.
    [11] Tseng Y M, Wu T Y,Wu J D.Towards efficient ID-based signature schemes with batch verifications from bilinear pairing[C]//International Conference on Availability,Reliability and Security.Washington,D.C.:IEEE,2009:935-940.
    [12] Camenisch J, Hohenberger S,Pedersent M Q.Batch verification of short signatures[C]//Advances in Cryptology-Eurocrypt 2007.Berlin:Springer,2007:246-263.
    [13] 黄佳庆,李宗鹏. 网络编码原理[M].北京:国防工业出版社,2012:31. Hang J Q,Li Z P.Network coding principles[M].Beijing:National Defense Industry Press,2012:31(in Chinese).
    [14] Lee S H, Gerla M,Krawczyk H,et al.Performance evaluation of secure network coding using homomorphic signature[C]//International Symposium on Network Coding(NetCod).Piscataway,NJ:IEEE,2011:1-6.
    [15] Liu G J, Wang B.Secure network coding against intra/inter-generation pollution attacks[J].Communications,China,2013,10(8):100-110.
    [16] Boneh D, Franklin M.Identity-based encryption from the Weil pairing[C]//Advances in Cryptology-CRYPTO 2001.Berlin:Springer,2001:213-229.

  • 加载中
计量
  • 文章访问数:  1022
  • HTML全文浏览量:  136
  • PDF下载量:  664
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-07-30
  • 修回日期:  2014-10-11
  • 网络出版日期:  2015-04-20

目录

    /

    返回文章
    返回
    常见问答