Skip to main content
Log in

Secure network coding from secure proof of retrievability

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Chang J Y, Shao B L, Ji Y Y, et al. Comment on “a tag encoding scheme against pollution attack to linear network coding”. IEEE Trans Parallel Distrib Syst, 2020, 31: 2618–2619

    Article  Google Scholar 

  2. Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: signature schemes for network coding. In: Proceedings of International Workshop on Public Key Cryptography, 2009. 68–87

  3. Chang J Y, Wang H Q, Wang F, et al. RKA security for identity-based signature scheme. IEEE Access, 2020, 8: 17833–17841

    Article  Google Scholar 

  4. Agrawal S, Boneh D. Homomorphic MACs: MAC-based integrity for network coding. In: Proceedings of International Conference on Applied Cryptography and Network Security, 2009. 292–305

  5. Ji Y Y, Shao B L, Chang J Y, et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl Math Comput, 2020, 386: 125478

    MATH  Google Scholar 

  6. Chen F, Xiang T, Yang Y Y, et al. Secure cloud storage meets with secure network coding. IEEE Trans Comput, 2016, 65: 1936–1948

    Article  MATH  Google Scholar 

  7. Zhang R, Ma H, Lu Y, et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci China Inf Sci, 2017, 60: 122104

    Article  Google Scholar 

  8. Shacham H, Waters B. Compact proofs of retrievability. J Cryptol, 2013, 26: 442–483

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61672416, 61872284, 61772514, 61672059), in part by National Key R&D Program of China (Grant No. 2017YFB1400700), and in part by Beijing Municipal Science & Technology Commission (Grant No. Z191100007119006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanyan Ji.

Supporting information

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, J., Shao, B., Ji, Y. et al. Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64, 229301 (2021). https://doi.org/10.1007/s11432-020-2997-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-020-2997-0

Navigation