Skip to main content
Log in

RETRACTED ARTICLE: Encryption scheme with mixed homomorphic signature based on message authentication for digital image

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

This article was retracted on 12 February 2024

This article has been updated

Abstract

To improve the digital image’s antipollution attack performance, an antipollution attack scheme with mixed homomorphic signature based on message authentication is proposed. Firstly, a model is created for the coding process of the digital image by dint of source node set, non-source code set, and link set of the directed multigraph, and with two types of attack in mind, the network antipollution model is established, i.e., data pollution attack and label pollution attack. Secondly, the MACs and D-MACs as well as homomorphic signature scheme of Sign are used to establish mixed homomorphic signature scheme, improve the message verification process of antipollution attack model, guarantee the integrity of the content in each MAC coding data package, and raise the execution efficiency of the algorithm; lastly, the three indices of percentage of polluted nodes, flow cumulative distribution, and computational efficiency for the proposed algorithm were compared in the experiment in the experimental simulative environment of ASNC mechanism, to verify the performance advantages of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Change history

References

  1. Catalano D (2014) Homomorphic signatures and message authentication codes. In: International Conference on Security and Cryptography for Networks. Springer, Berlin, pp 514–519

  2. Lin Q, Yan H, Huang Z et al (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640

    Article  Google Scholar 

  3. Zhang P, Yu J, Wang T (2012) A homomorphic aggregate signature scheme based on lattice. Chin J Electron 21(4):701–704

    Google Scholar 

  4. Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: Security and privacy in communication networks. Springer, Berlin, pp 19–28

  5. Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: International Conference on Security and Privacy in Communication Systems. Springer, Berlin, pp 19–28

  6. Gahi Y, Guennoun M, Elkhatib K (2015) A secure database system using homomorphic encryption schemes. Comput Sci. arXiv:1512.03498v1 [cs.CR]

  7. Han JL, Ming Y, Wang ZL (2011) Fully homomorphic encryption scheme extended to large message space. In: International Conference on Instrumentation. IEEE, pp 533–536

  8. Yang P, Gui X, An J et al (2015) An encrypted image editing scheme based on homomorphic encryption. In: IEEE Conference on Computer Communications Workshops. IEEE, pp 109–110

  9. Bos JW, Lauter K, Loftus J et al (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding. Springer, Berlin, pp 45–64

  10. Castagnos G (2007) Towards a DL-based additively homomorphic encryption scheme. In: International Conference on Information Security. Springer, Berlin, pp 362–375

  11. Chen ZG, Wang J, Chen L et al (2014) Review of how to construct a fully homomorphic encryption scheme. Int J Secur Appl 8(2):221–230

    Google Scholar 

  12. Tharwat A, Elhoseny M, Hassanien AE, Gabel T, Arunkumar N (2018) Intelligent Bézier curve-based path planning model using chaotic particle swarm optimization algorithm. Cluster Comput. https://doi.org/10.1007/s10586-018-2360-3

    Article  Google Scholar 

  13. Abdulhay E, Elamaran V, Arunkumar N, Venkatraman V (2018) Fault–tolerant medical imaging system with quintuple modular redundancy (QMR) configurations. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0748-9

    Article  Google Scholar 

  14. Abdulhay E, Arunkumar N, Narasimhan K, Vellaiappan E, Venkatraman V (2018) Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. Fut Gener Comput Syst 83:366–373. https://doi.org/10.1016/j.future.2018.02.009

    Article  Google Scholar 

  15. Vardhana M, Arunkumar N, Abdulhay E (2018) Iot based real time traffic control using cloud computing. Cluster Comput. https://doi.org/10.1007/s10586-018-2152-9

    Article  Google Scholar 

  16. Abdulhay E, Mohammed MA, Ibrahim DA, Arunkumar N, Venkatraman V (2018) Computer aided solution for automatic segmenting and measurements of blood leucocytes using static microscope images. J Med Syst. https://doi.org/10.1007/s10916-018-0912-y

    Article  PubMed  Google Scholar 

  17. Arunkumar N, Ramkumar K, Venkatraman V (2018) Entropy features for focal EEG and non focal EEG. J Comput Sci. https://doi.org/10.1016/j.jocs.2018.02.002

    Article  Google Scholar 

  18. Liu C, Arunkumar N (2018) Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. Cluster Comput. https://doi.org/10.1007/s10586-018-1870-3

    Article  Google Scholar 

Download references

Acknowledgements

We are grateful for the fund from Key laboratory Open Fund with No. 20120316.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Yang.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11227-024-05981-6

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, J., Fan, M. & Wang, G. RETRACTED ARTICLE: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. J Supercomput 76, 1201–1211 (2020). https://doi.org/10.1007/s11227-018-2528-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2528-x

Keywords

Navigation