Homomorphic MACs: MAC-Based Integrity for Network Coding

被引:163
作者
Agrawal, Shweta [1 ]
Boneh, Dan [2 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Stanford Univ, Stanford, CA 94305 USA
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY | 2009年 / 5536卷
关键词
D O I
10.1007/978-3-642-01957-9_18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be checked using traditional MACs and checksums. In addition, network coded systems are vulnerable to pollution attacks where a single malicious node can Hood the network with bad packets and prevent the receiver from decoding the packets correctly. Signature schemes have been proposed to thwart such attacks, but they tend to be too slow for online per-packet integrity. Here we propose a homomorphic MA C which allows checking the integrity of network coded data. Our homomorphic MAC is designed as a drop-in replacement for traditional MACs (such as HMAC) in systems using network coding.
引用
收藏
页码:292 / +
页数:2
相关论文
共 17 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] [Anonymous], P 2000 IEEE S SEC PR
  • [3] [Anonymous], INFOCOM
  • [4] [Anonymous], LNCS
  • [5] BONEH D, 2009, P PKC 2009
  • [6] Multicast security: A taxonomy and some efficient constructions
    Canetti, R
    Garay, J
    Itkis, G
    Micciancio, D
    Naor, M
    Pinkas, B
    [J]. IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 708 - 716
  • [7] CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
  • [8] CHARLES D, 2006, INT J INFOR IN PRESS
  • [9] Fan JL, 2007, ADV INTEL SYS RES, pU1
  • [10] Gkantsidis C, 2005, IEEE INFOCOM SER, P2235