TY - JOUR
T1 - A publicly verifiable network coding scheme with null-space HMAC
AU - Chen, Yonghui
AU - Zhang, Cheng
AU - Li, Wei
AU - Chen, Tingsong
AU - Zhang, Mingwu
PY - 2018/1/1
Y1 - 2018/1/1
N2 - The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.
AB - The encode-and-forward mechanism of network coding (NC) system, not only could provide increased network throughput, but also might get seriously vulnerable to pollution attacks. It has been an interesting and challenging topic how to design a secure, efficient and publicly verifiable homomorphic NC scheme. The existing cryptography-based NC schemes are grouped in either public key cryptosystem (PKC), or symmetric key cryptosystem (SKC). NC schemes in PKC naturally have public verifiability, but imply much more computation cost and longer operation delay. NC schemes in SKC have cheaper computations cost, but are dilemma about how to share the secret key to those intermediate nodes who might be malicious. Therefore, in this paper, we provide a new NC scheme that based on null-space HMAC with hierarchically sharing keys. The inner sharing keys are for the destination nodes to verify the integrity of the messages; the outer sharing keys are for the intermediate nodes to verify the integrity of the received packets. Our scheme shows a way how to balance the computation efficiency and the public verifiability for the NC system with a SKC scheme.
KW - Network coding
KW - Null-space hmac
KW - Publicly verifiable
UR - http://www.scopus.com/inward/record.url?scp=85064810989&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85064810989&partnerID=8YFLogxK
U2 - 10.1504/IJIIDS.2018.092001
DO - 10.1504/IJIIDS.2018.092001
M3 - Article
AN - SCOPUS:85064810989
SN - 1751-5858
VL - 11
SP - 117
EP - 131
JO - International Journal of Intelligent Information and Database Systems
JF - International Journal of Intelligent Information and Database Systems
IS - 2-3
ER -