CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2022-07-19
Cited: 0
Clicked: 2176
Huifang YU, Zhewei QI. Certificateless broadcast multi-signature for network coding[J]. Frontiers of Information Technology & Electronic Engineering, 2022, 23(9): 1369-1377.
@article{title="Certificateless broadcast multi-signature for network coding",
author="Huifang YU, Zhewei QI",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="23",
number="9",
pages="1369-1377",
year="2022",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2200271"
}
%0 Journal Article
%T Certificateless broadcast multi-signature for network coding
%A Huifang YU
%A Zhewei QI
%J Frontiers of Information Technology & Electronic Engineering
%V 23
%N 9
%P 1369-1377
%@ 2095-9184
%D 2022
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2200271
TY - JOUR
T1 - Certificateless broadcast multi-signature for network coding
A1 - Huifang YU
A1 - Zhewei QI
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 23
IS - 9
SP - 1369
EP - 1377
%@ 2095-9184
Y1 - 2022
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2200271
Abstract: network coding can save wireless network resources and is very fast in comparison with traditional routing. In real application scenarios, network coding is vulnerable to pollution attacks and forgery attacks. To solve these problems, the certificateless broadcast multi-signature for network coding (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediate node linearly combines the received data. NC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high. NC-CLBMS has extensive application prospects in unmanned aerial vehicle (UAV) communication networks, fifth-generation wireless networks, wireless sensor networks, mobile wireless networks, and Internet of Vehicles.
[1]Ahlswede R, Cai N, Li SYR, et al., 2000. Network information flow. IEEE Trans Inform Theory, 46(4):1204-1216.
[2]Al-Kofahi OM, Kamal AE, 2009. Network coding-based protection of many-to-one wireless flows. IEEE J Sel Areas Commun, 27(5):797-813.
[3]Li P, Guo S, Yu S, et al., 2012. CodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. Proc IEEE INFOCOM, p.100-108.
[4]Li SH, Mei ZH, 2016. Homomorphic signature scheme for network coding against inter-generation pollution attacks. Comput Technol Dev, 26(10):73-76 (in Chinese).
[5]Li ZP, Li BC, Lau LC, 2009. A constant bound on throughput improvement of multicast network coding in undirected networks. IEEE Trans Inform Theory, 55(3):1016-1026.
[6]Niu SF, Li WT, Wang CF, 2020. New efficient certificateless broadcast multi-signature scheme. Appl Res Comput, 37(8):2464-2467 (in Chinese).
[7]Papailiopoulos DS, Luo JQ, Dimakis AG, et al., 2012. Simple regenerating codes: network coding for cloud storage. Proc IEEE INFOCOM, p.2801-2805.
[8]Peng TL, Shang T, Liu JW, 2015. Signature scheme for network coding against inter-generation pollution attacks. J Beijing Univ Aeronaut Astronaut, 41(4):721-726 (in Chinese).
[9]Wang HP, Mei ZH, 2016. A scheme against pollution attacks based on secure network coding. Comput Technol Dev, 26(7):94-99 (in Chinese).
[10]Wang L, Zhang Z, Zhang H, et al., 2019. A RSA-based secure network coding scheme against multiple attacks. Comput Eng, 45(11):166-171 (in Chinese).
[11]Xu CD, Wang HQ, 2021. Sequential multi-signature scheme based on blockchain. J Nanjing Univ Posts Telecommun (Nat Sci Ed), 41(2):85-94 (in Chinese).
[12]Xu J, Liu YT, Xia GY, et al., 2016. Network coding based topology inference: a survey. Comput Sci, 43(S1):242-248, 264 (in Chinese).
[13]Yu HF, Gao XZ, 2019. Homomorphic ring signature scheme technology for multi-source network coding. Netinfo Secur, (2):36-42 (in Chinese).
[14]Yu HF, Li W, 2019. Homomorphic signature schemes for single-source and multi-source network coding. J Commun, 40(11):112-121 (in Chinese).
[15]Yu HF, Li W, 2020. A certificateless signature for multi-source network coding. J Inform Secur Appl, 55:102655.
[16]Yu HF, Wang WK, 2021. Certificateless network coding ring signature scheme. Secur Commun Netw, 2021:8029644.
[17]Zhou ZB, Xu L, 2016. Pollution-resistant network coding scheme based on digital signature. Comput Syst Appl, 25(6):185-190 (in Chinese).
Open peer comments: Debate/Discuss/Question/Opinion
<1>