Abstract
To improve the digital image’s antipollution attack performance, an antipollution attack scheme with mixed homomorphic signature based on message authentication is proposed. Firstly, a model is created for the coding process of the digital image by dint of source node set, non-source code set, and link set of the directed multigraph, and with two types of attack in mind, the network antipollution model is established, i.e., data pollution attack and label pollution attack. Secondly, the MACs and D-MACs as well as homomorphic signature scheme of Sign are used to establish mixed homomorphic signature scheme, improve the message verification process of antipollution attack model, guarantee the integrity of the content in each MAC coding data package, and raise the execution efficiency of the algorithm; lastly, the three indices of percentage of polluted nodes, flow cumulative distribution, and computational efficiency for the proposed algorithm were compared in the experiment in the experimental simulative environment of ASNC mechanism, to verify the performance advantages of the proposed algorithm.
Similar content being viewed by others
Change history
12 February 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11227-024-05981-6
References
Catalano D (2014) Homomorphic signatures and message authentication codes. In: International Conference on Security and Cryptography for Networks. Springer, Berlin, pp 514–519
Lin Q, Yan H, Huang Z et al (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640
Zhang P, Yu J, Wang T (2012) A homomorphic aggregate signature scheme based on lattice. Chin J Electron 21(4):701–704
Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: Security and privacy in communication networks. Springer, Berlin, pp 19–28
Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: International Conference on Security and Privacy in Communication Systems. Springer, Berlin, pp 19–28
Gahi Y, Guennoun M, Elkhatib K (2015) A secure database system using homomorphic encryption schemes. Comput Sci. arXiv:1512.03498v1 [cs.CR]
Han JL, Ming Y, Wang ZL (2011) Fully homomorphic encryption scheme extended to large message space. In: International Conference on Instrumentation. IEEE, pp 533–536
Yang P, Gui X, An J et al (2015) An encrypted image editing scheme based on homomorphic encryption. In: IEEE Conference on Computer Communications Workshops. IEEE, pp 109–110
Bos JW, Lauter K, Loftus J et al (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding. Springer, Berlin, pp 45–64
Castagnos G (2007) Towards a DL-based additively homomorphic encryption scheme. In: International Conference on Information Security. Springer, Berlin, pp 362–375
Chen ZG, Wang J, Chen L et al (2014) Review of how to construct a fully homomorphic encryption scheme. Int J Secur Appl 8(2):221–230
Tharwat A, Elhoseny M, Hassanien AE, Gabel T, Arunkumar N (2018) Intelligent Bézier curve-based path planning model using chaotic particle swarm optimization algorithm. Cluster Comput. https://doi.org/10.1007/s10586-018-2360-3
Abdulhay E, Elamaran V, Arunkumar N, Venkatraman V (2018) Fault–tolerant medical imaging system with quintuple modular redundancy (QMR) configurations. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0748-9
Abdulhay E, Arunkumar N, Narasimhan K, Vellaiappan E, Venkatraman V (2018) Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. Fut Gener Comput Syst 83:366–373. https://doi.org/10.1016/j.future.2018.02.009
Vardhana M, Arunkumar N, Abdulhay E (2018) Iot based real time traffic control using cloud computing. Cluster Comput. https://doi.org/10.1007/s10586-018-2152-9
Abdulhay E, Mohammed MA, Ibrahim DA, Arunkumar N, Venkatraman V (2018) Computer aided solution for automatic segmenting and measurements of blood leucocytes using static microscope images. J Med Syst. https://doi.org/10.1007/s10916-018-0912-y
Arunkumar N, Ramkumar K, Venkatraman V (2018) Entropy features for focal EEG and non focal EEG. J Comput Sci. https://doi.org/10.1016/j.jocs.2018.02.002
Liu C, Arunkumar N (2018) Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. Cluster Comput. https://doi.org/10.1007/s10586-018-1870-3
Acknowledgements
We are grateful for the fund from Key laboratory Open Fund with No. 20120316.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11227-024-05981-6
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, J., Fan, M. & Wang, G. RETRACTED ARTICLE: Encryption scheme with mixed homomorphic signature based on message authentication for digital image. J Supercomput 76, 1201–1211 (2020). https://doi.org/10.1007/s11227-018-2528-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2528-x