A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT

被引:17
作者
Wu, Bin [1 ]
Wang, Caifen [2 ]
Yao, Hailong [3 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Lanzhou 730070, Peoples R China
[2] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
[3] Lanzhou City Univ, Sch Elect & Informat Engn, Lanzhou 730070, Peoples R China
关键词
Homomorphic signature; Certificateless cryptography system; Network coding; Provable security; INTERNET;
D O I
10.1007/s12083-020-01028-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding is an effective method to optimize network throughput and improve routing reliability, and has been widely used in a decentralized Internet of Things system. However, the packet-mixing property of network coding renders transmission susceptible to pollution attacks, which may prevent the reconstruction of the original file. A homomorphic signature scheme is a powerful tool that enables network coding to combat pollution attacks. Although a series of homomorphic signature schemes already exists, no construction has been proposed to support both homomorphic network coding signatures and the certificateless characteristic. In this paper, we construct a certificateless linearly homomorphic signature scheme for network coding, thus avoiding the disadvantages of certificate management and key escrow problems. We then prove the security of the scheme in a random oracle model against an adaptively chosen dataset attack under two types of adversaries. Moreover, performance analysis results show that our scheme has a lower communication overhead and enjoys a comparable computation cost with related schemes.
引用
收藏
页码:852 / 872
页数:21
相关论文
共 50 条
[1]   Homomorphic MACs: MAC-Based Integrity for Network Coding [J].
Agrawal, Shweta ;
Boneh, Dan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 :292-+
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
Alaybeyi S., 2016, Pragmatic strategies to improve industrial iot security
[4]  
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[5]  
[Anonymous], 2019, SHOCK VIB
[6]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P17, DOI 10.1007/978-3-642-19379-8_2
[7]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[8]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[9]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6571, P1, DOI 10.1007/978-3-642-19379-8_1
[10]  
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68