Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system

被引:14
作者
Li, Yumei [1 ]
Zhang, Futai [2 ]
Sun, Yinxia [3 ]
机构
[1] Nanjing Normal Univ, Sch Math Sci, Nanjing, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
We greatly appreciate the invaluable suggestions provided by the anonymous reviewers and the editor. This work was supported in part by the National Natural Science Foundation of China under Grant 61672289 and Grant 61802195;
D O I
10.1049/ise2.12011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the flourishing development of the Internet of Things (IoT), the electronic health system (EHS) as a leading technology has attracted widespread attention. However, the unsatisfactory network transmission throughput hinders practical applications of EHS to some extent. Network coding can solve this problem, but it also incurs another drawback called pollution attack. Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. However, existing schemes require high computational cost for signature verification which will reduce the transmission efficiency. A lightweight certificateless linearly homomorphic network coding signature scheme is proposed. This scheme requires a quite low computational cost when both signing and verifying a data packet. In addition, it is proved that the scheme is secure, and it was implemented by using the Java Pairing-Based Cryptography Library (JPBC) on a personal computer (PC). The simulation results illustrate that our scheme is efficient.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 37 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
Ashton K., 2009, RFID J.
[3]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P17, DOI 10.1007/978-3-642-19379-8_2
[4]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[5]  
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68
[6]  
Catalano D, 2014, LECT NOTES COMPUT SC, V8616, P371, DOI 10.1007/978-3-662-44371-2_21
[7]   RKA Security of Identity-Based Homomorphic Signature Scheme [J].
Chang, Jinyong ;
Ma, Hui ;
Zhang, Anling ;
Xu, Maozhi ;
Xue, Rui .
IEEE ACCESS, 2019, 7 :50858-50868
[8]   Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding [J].
Cheng, Chi ;
Lee, Jemin ;
Jiang, Tao ;
Takagi, Tsuyoshi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :993-1002
[9]  
Cheng Z, 2012, INT CONF CLOUD COMPU, P1092, DOI 10.1109/CCIS.2012.6664551
[10]  
De Caro A, 2011, IEEE SYMP COMP COMMU