Abstract
We study the problem of designing secure network coding signatures in the network with multiple sources. At present, there exists some multi-source homomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the standard model.
Similar content being viewed by others
References
Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17–34. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_2
Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)
Agrawal, S., Boneh, D., Boyen, X., Freeman, D.M.: Preventing pollution attacks in multi-source network coding. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 161–176. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13013-7_10
Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_4
Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1–16. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_1
Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68–87. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00468-1_5
Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207–223. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_13
Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin et al. [12], pp. 680–696
Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016)
Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697–714. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30057-8_41
Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of 2004 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 226–240, 9–12 May 2004
Fischlin, M., Buchmann, J., Manulis, M. (eds.): PKC 2012. LNCS, vol. 7293. Springer, Heidelberg (2012)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2015). doi:10.1109/TPDS.2015.2506573
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98–B(1), 190–200 (2015)
Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142–160. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13013-7_9
Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (2006)
Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002). doi:10.1007/3-540-45760-7_17
Kang, H.J., Vasserman, E.Y., Lee, H.T., Cheon, J.H., Kim, Y.: Secure network coding for a P2P system. In: ACM Conference on Computer and Communications Security, Poster (2009)
Lauter, K.E., Charles, X.D., Jain, K.: Signatures for network coding. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS 2006), pp. 857–863 (2006)
Robert-Li, S.-Y., Yeung, R.Y., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371–381 (2003)
Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010). doi:10.1007/978-3-642-11799-2_27
Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98–D(4), 902–910 (2015)
Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78(1), 231–246 (2014)
Yun, A., Cheon, J., Kim, Y.: On homomorphic signatures for network coding. IEEE Trans. Comput. 59(9), 1295–1296 (2010)
Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM) (2008)
Wang, Y.: Insecure provable secure network coding. http://eprint.iacr.org/2009/504
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016). doi:10.1109/TIFS.2016.2590944
Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.-N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48–63 (2016). doi:10.1109/TIFS.2016.2601065
Zhao, F., Kalker, T., Médard, M., Han, K.J.: Signatures for content distribution with network coding. In: Proceedings of 2007 IEEE International Symposium on Information Theory (ISIT 2007), pp. 556–560 (2007)
Acknowledgments
We would like to thank the anonymous referees for their careful readings of the manuscripts and many useful suggestions.
Wenbin Chen’s research has been partly supported by the science research funding of Huawei Technologies Co., Ltd. under Grant No. YBCB2012055, by the National Natural Science Foundation of China (NSFC) under Grant No. 11271097, and by the Program for Innovative Research Team in Education Department of Guangdong Province Under No. 2015KCXTD014. Jin Li’s research has been supported by National Natural Science Foundation of China (No. 61472091), by Natural Science Foundation of Guangdong Province for Distinguished Young Scholars (2014A030306020), by Guangzhou scholars project (No. 1201561613), by Science and Technology Planning Project of Guangdong Province, China (2015B010129015) and by the program of the State Key Laboratory for Cryptology. FuFang Li’s work had been co-financed by: National Natural Science Foundation of China under Grant No. 61472092; Guangdong Provincial Science and Technology Plan Project under Grant No. 2013B010401037; and GuangZhou Municipal High School Science Research Fund under grant No. 1201421317. Ke Qi’s research has been supported by the Guangzhou Science and Technology Plan Project under Grant No. 201605061403261 and 2014 State Scholarship Fund (201408440338).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chen, W., Lei, H., Li, J., Gao, C., Li, F., Qi, K. (2017). A Multi-source Homomorphic Network Coding Signature in the Standard Model. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-57186-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57185-0
Online ISBN: 978-3-319-57186-7
eBook Packages: Computer ScienceComputer Science (R0)