Skip to main content

A Multi-source Homomorphic Network Coding Signature in the Standard Model

  • Conference paper
  • First Online:
Green, Pervasive, and Cloud Computing (GPC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10232))

Included in the following conference series:

Abstract

We study the problem of designing secure network coding signatures in the network with multiple sources. At present, there exists some multi-source homomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the standard model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Attrapadung, N., Libert, B.: Homomorphic network coding signatures in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 17–34. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_2

    Chapter  Google Scholar 

  2. Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Agrawal, S., Boneh, D., Boyen, X., Freeman, D.M.: Preventing pollution attacks in multi-source network coding. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 161–176. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13013-7_10

    Chapter  Google Scholar 

  4. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_4

    Chapter  Google Scholar 

  5. Boneh, D., Freeman, D.M.: Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 1–16. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_1

    Chapter  Google Scholar 

  6. Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: signature schemes for network coding. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 68–87. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00468-1_5

    Chapter  Google Scholar 

  7. Catalano, D., Fiore, D., Warinschi, B.: Adaptive pseudo-free groups and applications. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 207–223. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20465-4_13

    Chapter  Google Scholar 

  8. Catalano, D., Fiore, D., Warinschi, B.: Efficient network coding signatures in the standard model. In: Fischlin et al. [12], pp. 680–696

    Google Scholar 

  9. Chen, W., Lei, H., Qi, K.: Lattice-based linearly homomorphic signatures in the standard model. Theor. Comput. Sci. 634, 47–54 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  10. Freeman, D.M.: Improved security for linearly homomorphic signatures: a generic framework. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 697–714. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30057-8_41

    Chapter  Google Scholar 

  11. Krohn, M.N., Freedman, M.J., Mazieres, D.: On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proceedings of 2004 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp. 226–240, 9–12 May 2004

    Google Scholar 

  12. Fischlin, M., Buchmann, J., Manulis, M. (eds.): PKC 2012. LNCS, vol. 7293. Springer, Heidelberg (2012)

    MATH  Google Scholar 

  13. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2015). doi:10.1109/TPDS.2015.2506573

    Article  Google Scholar 

  14. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98–B(1), 190–200 (2015)

    Article  Google Scholar 

  15. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  16. Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142–160. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13013-7_9

    Chapter  Google Scholar 

  17. Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) (2006)

    Google Scholar 

  18. Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)

    Google Scholar 

  19. Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002). doi:10.1007/3-540-45760-7_17

    Chapter  Google Scholar 

  20. Kang, H.J., Vasserman, E.Y., Lee, H.T., Cheon, J.H., Kim, Y.: Secure network coding for a P2P system. In: ACM Conference on Computer and Communications Security, Poster (2009)

    Google Scholar 

  21. Lauter, K.E., Charles, X.D., Jain, K.: Signatures for network coding. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems (CISS 2006), pp. 857–863 (2006)

    Google Scholar 

  22. Robert-Li, S.-Y., Yeung, R.Y., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371–381 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010). doi:10.1007/978-3-642-11799-2_27

    Chapter  Google Scholar 

  24. Ma, T., Zhou, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M., Lee, S.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. E98–D(4), 902–910 (2015)

    Article  Google Scholar 

  25. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  26. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)

    Article  Google Scholar 

  27. Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78(1), 231–246 (2014)

    Article  Google Scholar 

  28. Yun, A., Cheon, J., Kim, Y.: On homomorphic signatures for network coding. IEEE Trans. Comput. 59(9), 1295–1296 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  29. Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: Proceedings of the Conference of the IEEE Computer and Communications Societies (INFOCOM) (2008)

    Google Scholar 

  30. Wang, Y.: Insecure provable secure network coding. http://eprint.iacr.org/2009/504

  31. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016). doi:10.1109/TIFS.2016.2590944

    Article  Google Scholar 

  32. Zhou, Z., Wang, Y., Wu, Q.M.J., Yang, C.-N., Sun, X.: Effective and efficient global context verification for image copy detection. IEEE Trans. Inf. Forensics Secur. 12, 48–63 (2016). doi:10.1109/TIFS.2016.2601065

    Article  Google Scholar 

  33. Zhao, F., Kalker, T., Médard, M., Han, K.J.: Signatures for content distribution with network coding. In: Proceedings of 2007 IEEE International Symposium on Information Theory (ISIT 2007), pp. 556–560 (2007)

    Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous referees for their careful readings of the manuscripts and many useful suggestions.

Wenbin Chen’s research has been partly supported by the science research funding of Huawei Technologies Co., Ltd. under Grant No. YBCB2012055, by the National Natural Science Foundation of China (NSFC) under Grant No. 11271097, and by the Program for Innovative Research Team in Education Department of Guangdong Province Under No. 2015KCXTD014. Jin Li’s research has been supported by National Natural Science Foundation of China (No. 61472091), by Natural Science Foundation of Guangdong Province for Distinguished Young Scholars (2014A030306020), by Guangzhou scholars project (No. 1201561613), by Science and Technology Planning Project of Guangdong Province, China (2015B010129015) and by the program of the State Key Laboratory for Cryptology. FuFang Li’s work had been co-financed by: National Natural Science Foundation of China under Grant No. 61472092; Guangdong Provincial Science and Technology Plan Project under Grant No. 2013B010401037; and GuangZhou Municipal High School Science Research Fund under grant No. 1201421317. Ke Qi’s research has been supported by the Guangzhou Science and Technology Plan Project under Grant No. 201605061403261 and 2014 State Scholarship Fund (201408440338).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Chen, W., Lei, H., Li, J., Gao, C., Li, F., Qi, K. (2017). A Multi-source Homomorphic Network Coding Signature in the Standard Model. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57186-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57185-0

  • Online ISBN: 978-3-319-57186-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics