Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system

被引:14
作者
Li, Yumei [1 ]
Zhang, Futai [2 ]
Sun, Yinxia [3 ]
机构
[1] Nanjing Normal Univ, Sch Math Sci, Nanjing, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
We greatly appreciate the invaluable suggestions provided by the anonymous reviewers and the editor. This work was supported in part by the National Natural Science Foundation of China under Grant 61672289 and Grant 61802195;
D O I
10.1049/ise2.12011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the flourishing development of the Internet of Things (IoT), the electronic health system (EHS) as a leading technology has attracted widespread attention. However, the unsatisfactory network transmission throughput hinders practical applications of EHS to some extent. Network coding can solve this problem, but it also incurs another drawback called pollution attack. Pollution attack can be prevented by using homomorphic network coding signature schemes to check whether a corrupted packet is injected. However, existing schemes require high computational cost for signature verification which will reduce the transmission efficiency. A lightweight certificateless linearly homomorphic network coding signature scheme is proposed. This scheme requires a quite low computational cost when both signing and verifying a data packet. In addition, it is proved that the scheme is secure, and it was implemented by using the Java Pairing-Based Cryptography Library (JPBC) on a personal computer (PC). The simulation results illustrate that our scheme is efficient.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 37 条
[21]   Linear network coding [J].
Li, SYR ;
Yeung, RW ;
Cai, N .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) :371-381
[22]   A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT [J].
Li, Tong ;
Chen, Wenbin ;
Tang, Yi ;
Yan, Hongyang .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[23]   An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain [J].
Lin, Qun ;
Yan, Hongyang ;
Huang, Zhengan ;
Chen, Wenbin ;
Shen, Jian ;
Tang, Yi .
IEEE ACCESS, 2018, 6 :20632-20640
[24]  
Liu Z., 2020, International Journal of Network Security, V22, P845
[25]  
Lovay M, 2015, PROCEEDINGS OF THE 2015 ARGENTINE SCHOOL OF MICRO-NANOELECTRONICS, TECHNOLOGY AND APPLICATIONS (EAMTA), P1, DOI 10.1109/EAMTA.2015.7237369
[26]   An Authentication Code Against Pollution Attacks in Network Coding [J].
Oggier, Frederique ;
Fathi, Hanane .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) :1587-1596
[27]   Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation [J].
Qian, Huiling ;
Li, Jiguo ;
Zhang, Yichen ;
Han, Jinguang .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) :487-497
[28]  
SadrHaghighi S, 2016, 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), P7, DOI 10.1109/ISCISC.2016.7736444
[29]  
statista, NUMB INT THINGS IOT
[30]   Identity-based remote data possession checking in public clouds [J].
Wang, Huaqun ;
Wu, Qianhong ;
Qin, Bo ;
Domingo-Ferrer, Josep .
IET INFORMATION SECURITY, 2014, 8 (02) :114-121