Skip to main content
Log in

Universal secure error-correcting (SEC) schemes for network coding via McEliece cryptosystem based on QC-LDPC codes

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The McEliece cryptosystem based on quasi-cyclic low-density parity check (QC-LDPC) codes is presented to offer both security and error-correction simultaneously in the determined network coding system. The characteristics of the cryptosystem make it does not need to reduce information rate additionally to offer security. The messages u is encoded into x with QC-LDPC. x is transmitted through a network where a network coding error-correcting scheme is performed. \(\rho \) links are observed by the adversary and t errors occur in the network. The characteristic of MDS code make the errors cannot be spread, therefore, the corrupted packets which occur in t links will cause at most t errors in the received messages in the sink. As long as the number of errors occuring in the intermediate links will not exceed the minimum distance of QC-LDPC codes, the hybrid scheme can perform error-correcting and security simultaneously. The information rate reaches \({\mathrm{n}} - 2t\) instead of \({\mathrm{n}} - \mu - 2t\) where n is the max-flow min-cut.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Talooki, V.N., Bassoli, R., Lucani, D.E., Rodriguez, J., Fitzek, F.H.P., Marques, H., Tafazolli, R.: Security concerns and countermeasures in network coding based communication systems: a survey. Comput. Netw. 83, 422–445 (2015)

    Google Scholar 

  2. Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient scheme for securing XOR network coding against pollution attacks. In: INFOCOM, pp. 406–414 (2009)

  3. Gkantsidis, C., Rodriguez, P.R.: Cooperative security for network coding file distribution. In: INFOCOM 2006. IEEE International Conference on Computer Communications. Proceedings, pp. 1–13 (2006)

  4. Zhao, K., Chu, X., Wang, M., Jiang, Y.: Speeding up homomorpic hashing using gpus. In: IEEE International Conference on Communications, pp. 856–860 (2009)

  5. Islam, M.S., Kim, J.M.: Gpu-based fast error recovery for high speed data communication in media technology. Clust. Comput. 18(1), 93–101 (2015)

    Google Scholar 

  6. Jiang, H., Chen, Y., Qiao, Z., Weng, T.H., Li, K.C.: Scaling up mapreduce-based big data processing on multi-gpu systems. Clust. Comput. 18(1), 369–383 (2015)

    Google Scholar 

  7. Wang, Q., Long, V., Nahrstedt, K., Khurana, H.: Mis: malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In: Conference on Information Communications, pp. 296–300 (2010)

  8. Yang, S., Yeung, R.W., Chi, K.N.: Refined coding bounds and code constructions for coherent network error correction. IEEE Trans. Inf. Theory 57(3), 1409–1424 (2009)

    Google Scholar 

  9. Xuan, G., Fu, F.W., Zhang, Z.: Construction of network error correction codes in packet networks. In: International Symposium on NETWORKING Coding, pp. 1–6 (2011)

  10. Matsumoto, R.: Construction algorithm for network error-correcting codes attaining the singleton bound. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E90–A(9), 1729–1735 (2007)

  11. Yang, S., Yeung, R.W.: Characterizations of network error correction/detection and erasure correction. Proc Netcod (2007)

  12. Zhang, Z.: Linear network error correction codes in packet networks. IEEE Trans. Inf. Theory 54(1), 209–218 (2008)

    Google Scholar 

  13. Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Medard, M., Effros, M.: Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54(6), 2596–2603 (2008)

    Google Scholar 

  14. Silva, D., Kschischang, F.R., Koetter, R.: A rank-metric approach to error control in random network coding. IEEE Trans. Inf. Theory 54(9), 3951–3967 (2008)

    Google Scholar 

  15. Silva, D., Kschischang, F.R.: Using rank-metric codes for error correction in random network coding. In: IEEE International Symposium on Information Theory, pp. 796–800 (2007)

  16. Siavoshani, M.J., Fragouli, C., Diggavi, S.N.: Subspace properties of network coding and their applications. IEEE Trans. Inf. Theory 58(5), 2599–2619 (2012)

    Google Scholar 

  17. Silva, D., Kschischang, F.R.: Security for wiretap networks via rank-metric codes. In: IEEE International Symposium on Information Theory, pp. 176–180 (2007)

  18. Koetter, R., Kschischang, F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54(8), 3579–3591 (2007)

    Google Scholar 

  19. Ngai, C.K., Yang, S.: Deterministic secure error-correcting (sec) network codes. In: The Workshop on Network Coding, pp. 96–101 (2009)

  20. Silva, D., Kschischang, F.R.: Universal secure error-correcting schemes for network coding. In: IEEE International Symposium on Information Theory Proceedings, pp. 2428–2432 (2010)

  21. Silva, D., Kschischang, F.R.: Universal secure network coding via rank-metric codes. IEEE Trans. Inf. Theory 57(2), 1124–1135 (2011)

    Google Scholar 

  22. Mceliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report, pp. 114–116 (1978)

  23. Baldi, M., Chiaraluce, F.: Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC codes. In: IEEE International Symposium on Information Theory, pp. 2591–2595 (2007)

  24. Sanders, P., Egner, S., Tolhuizen, L.: Polynomial time algorithms for network information flow. ACM Symposium on Parallel Algorithms and Architectures, pp. 286–294 (2003)

  25. Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: INFOCOM 2008. the Conference on Computer Communications. IEEE, pp. 1409–1417 (2008)

  26. Venturelli, R.B., Silva, D.: An evaluation of erasure decoding algorithms for gabidulin codes. In: Telecommunications Symposium, pp. 1–5 (2014)

  27. Rashwan, H., Gabidulin, E.M., Honary, B.: Security of the GPT cryptosystem and its applications to cryptography. Secur. Commun. Netw. 4(8), 937–946 (2011)

    Google Scholar 

  28. Wang, L., Yang, Y., Zhao, W.: Network coding-based multipath routing for energy efficiency in wireless sensor networks. Eurasip J. Wirel. Commun. Netw. 2012(1), 115 (2012)

    Google Scholar 

  29. Chou, P.A., Wu, Y.: Practical network coding. In: Conference on Information Communications (2003)

  30. Guo, Z., Wang, B., Xie, P., Zeng, W., Cui, J.H.: Efficient error recovery with network coding in underwater sensor networks. Ad Hoc Netw. 7(4), 791–802 (2009)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the fundamental research funds for Heilongjiang provincial universities (the study on error spreading depression in network coding), Suihua technology office program (SHKJ2015-015, SHKJ2015-014 ), National Science Foundation of China (61571150), Education Office of Heilongjiang Province Science and Technology Program (2016-KYYWF-0937), Suihua University Program (K1502003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangzhi Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, G., Cai, S. Universal secure error-correcting (SEC) schemes for network coding via McEliece cryptosystem based on QC-LDPC codes. Cluster Comput 22 (Suppl 2), 2599–2610 (2019). https://doi.org/10.1007/s10586-017-1354-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1354-x

Keywords

Navigation