A CVP-BASED LATTICE SIGNATURE SCHEME FOR NETWORK CODING

被引:0
作者
Shang, Tao [1 ]
Pei, Hengli [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, 37 Xueyuan Rd, Beijing 100191, Peoples R China
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2014年 / 10卷 / 01期
关键词
Network coding; Pollution attack; CVP; Lattice; Signature scheme;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pollution attack is one of the main threats confronting network coding. The policy of detection and prevention of polluted messages is an important aspect of secure framework in a network based on network coding. Inspired by the idea of self/nonself discrimination in immune principle, signature is an effective approach to the discrimination of normal message and abnormal message. Most of the existent signature schemes cannot catch up with the rapid development of high-speed computers. To provide a high-security guarantee to network coding and lower the computing complexity induced by signature scheme, we introduce lattice theory to construct a secure signature scheme. Firstly, we propose a lattice-based signature scheme for network coding and its core algorithm SampleCVP which can ensure the randomness of output signature. Secondly, we stipulate its security to the hard problem CVP (Closest Vector Problem) on lattices. Security analyses show that the proposed scheme has a stronger unforgeability for the natural property of lattices than traditional signature schemes.
引用
收藏
页码:317 / 327
页数:11
相关论文
共 22 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
Birkhoff G., 1967, COLL PUB, V1967, P3
[3]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6571, P1, DOI 10.1007/978-3-642-19379-8_1
[4]  
Cao Zhang-hua, 2010, Journal of Computer Applications, V30, P499, DOI 10.3724/SP.J.1087.2010.00499
[5]  
de Castro LN, 2003, SOFT COMPUT, V7, P526, DOI [10.1007/S00500-002-0237-Z, 10.1007/S00500-002-0237-z]
[6]  
Gentry C., 2001, ADV CRYPTOLOGY ASIAC, V2248, P1
[7]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[9]   On the limits of nonapproximability of lattice problems [J].
Goldreich, O ;
Goldwasser, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 60 (03) :540-563
[10]  
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112