A publicly verifiable network coding scheme with null-space HMAC

Yonghui Chen, Cheng Zhang, Wei Li, Tingsong Chen, Mingwu Zhang

研究成果: Article

抄録

The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.

元の言語English
ページ(範囲)117-131
ページ数15
ジャーナルInternational Journal of Intelligent Information and Database Systems
11
発行部数2-3
DOI
出版物ステータスPublished - 2018 1 1

Fingerprint

Network coding
Cryptography
Costs
Pollution
Throughput

ASJC Scopus subject areas

  • Information Systems

これを引用

A publicly verifiable network coding scheme with null-space HMAC. / Chen, Yonghui; Zhang, Cheng; Li, Wei; Chen, Tingsong; Zhang, Mingwu.

:: International Journal of Intelligent Information and Database Systems, 巻 11, 番号 2-3, 01.01.2018, p. 117-131.

研究成果: Article

Chen, Yonghui ; Zhang, Cheng ; Li, Wei ; Chen, Tingsong ; Zhang, Mingwu. / A publicly verifiable network coding scheme with null-space HMAC. :: International Journal of Intelligent Information and Database Systems. 2018 ; 巻 11, 番号 2-3. pp. 117-131.
@article{153b4c51d4294a74a1898a907dc587b8,
title = "A publicly verifiable network coding scheme with null-space HMAC",
abstract = "The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.",
keywords = "Network coding, Null-space hmac, Publicly verifiable",
author = "Yonghui Chen and Cheng Zhang and Wei Li and Tingsong Chen and Mingwu Zhang",
year = "2018",
month = "1",
day = "1",
doi = "10.1504/IJIIDS.2018.092001",
language = "English",
volume = "11",
pages = "117--131",
journal = "International Journal of Intelligent Information and Database Systems",
issn = "1751-5858",
publisher = "Inderscience Enterprises Ltd",
number = "2-3",

}

TY - JOUR

T1 - A publicly verifiable network coding scheme with null-space HMAC

AU - Chen, Yonghui

AU - Zhang, Cheng

AU - Li, Wei

AU - Chen, Tingsong

AU - Zhang, Mingwu

PY - 2018/1/1

Y1 - 2018/1/1

N2 - The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.

AB - The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.

KW - Network coding

KW - Null-space hmac

KW - Publicly verifiable

UR - http://www.scopus.com/inward/record.url?scp=85064810989&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064810989&partnerID=8YFLogxK

U2 - 10.1504/IJIIDS.2018.092001

DO - 10.1504/IJIIDS.2018.092001

M3 - Article

VL - 11

SP - 117

EP - 131

JO - International Journal of Intelligent Information and Database Systems

JF - International Journal of Intelligent Information and Database Systems

SN - 1751-5858

IS - 2-3

ER -