{"title":"基于同态签名的安全网络编码对抗污染攻击","authors":"Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li","doi":"10.1109/CCIS.2012.6664551","DOIUrl":null,"url":null,"abstract":"The network coding systems are vulnerable to pollution attacks, in which the adversary forwarders can inject polluted or forged messages into networks. In this paper, we propose a homomorphic signature scheme to provide security protection against pollution attacks, which mainly uses the homomorphic property of signature based on Paillier cryptosystem. On one hand, it guarantees the forwarders to verify the received messages effectively. If the verification is failed, the message is assumed to be polluted and should be discarded. On the other hand, the proposed scheme can generate the valid signatures for its output messages from the signatures of input ones without knowing the source's private key such that extra secure channels are not needed. We also make the security analysis and prove that our signature scheme is secure enough to defend against pollution attacks.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure network coding based on homomorpuic signature against pollution attacks\",\"authors\":\"Zhen Cheng, Kaikai Chi, Xianzhong Tian, Yanjun Li\",\"doi\":\"10.1109/CCIS.2012.6664551\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The network coding systems are vulnerable to pollution attacks, in which the adversary forwarders can inject polluted or forged messages into networks. In this paper, we propose a homomorphic signature scheme to provide security protection against pollution attacks, which mainly uses the homomorphic property of signature based on Paillier cryptosystem. On one hand, it guarantees the forwarders to verify the received messages effectively. If the verification is failed, the message is assumed to be polluted and should be discarded. On the other hand, the proposed scheme can generate the valid signatures for its output messages from the signatures of input ones without knowing the source's private key such that extra secure channels are not needed. We also make the security analysis and prove that our signature scheme is secure enough to defend against pollution attacks.\",\"PeriodicalId\":392558,\"journal\":{\"name\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCIS.2012.6664551\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIS.2012.6664551","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure network coding based on homomorpuic signature against pollution attacks
The network coding systems are vulnerable to pollution attacks, in which the adversary forwarders can inject polluted or forged messages into networks. In this paper, we propose a homomorphic signature scheme to provide security protection against pollution attacks, which mainly uses the homomorphic property of signature based on Paillier cryptosystem. On one hand, it guarantees the forwarders to verify the received messages effectively. If the verification is failed, the message is assumed to be polluted and should be discarded. On the other hand, the proposed scheme can generate the valid signatures for its output messages from the signatures of input ones without knowing the source's private key such that extra secure channels are not needed. We also make the security analysis and prove that our signature scheme is secure enough to defend against pollution attacks.