Full Text:  <112>

Summary:  <8>

CLC number: TP309

On-line Access: 2022-09-21

Received: 2022-06-22

Revision Accepted: 2022-09-21

Crosschecked: 2022-07-19

Cited: 0

Clicked: 198

Citations:  Bibtex RefMan EndNote GB/T7714


Huifang Yu


-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering 

Accepted manuscript available online (unedited version)

Certificateless broadcast multi-signature for network coding

Author(s):  Huifang YU, Zhewei QI

Affiliation(s):  School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China

Corresponding email(s):  yuhuifang@xupt.edu.cn

Key Words:  Network coding; Certificateless multi-signature; Linear combination; Homomorphic hash function

Share this article to: More <<< Previous Paper|Next Paper >>>

Huifang YU, Zhewei QI. Certificateless broadcast multi-signature for network coding[J]. Frontiers of Information Technology & Electronic Engineering , 2022, 23(7): 1369-1377.

@article{title="Certificateless broadcast multi-signature for network coding",
author="Huifang YU, Zhewei QI",
journal="Frontiers of Information Technology & Electronic Engineering",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T Certificateless broadcast multi-signature for network coding
%A Huifang YU
%A Zhewei QI
%J Frontiers of Information Technology & Electronic Engineering
%V 23
%N 9
%P 1369-1377
%@ 1869-1951
%D 2022
%I Zhejiang University Press & Springer

T1 - Certificateless broadcast multi-signature for network coding
A1 - Huifang YU
A1 - Zhewei QI
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 23
IS - 9
SP - 1369
EP - 1377
%@ 1869-1951
Y1 - 2022
PB - Zhejiang University Press & Springer
ER -

Network coding can save wireless network resources and is very fast in comparison with traditional routing. In real application scenarios, network coding is vulnerable to pollution attacks and forgery attacks. To solve these problems, the certificateless broadcast multi-signature for network coding (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediate node linearly combines the received data. NC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high. NC-CLBMS has extensive application prospects in unmanned aerial vehicle (UAV) communication networks, fifth-generation wireless networks, wireless sensor networks, mobile wireless networks, and Internet of Vehicles.




Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1]Ahlswede R, Cai N, Li SYR, et al., 2000. Network information flow. IEEE Trans Inform Theory, 46(4):1204-1216.

[2]Al-Kofahi OM, Kamal AE, 2009. Network coding-based protection of many-to-one wireless flows. IEEE J Sel Areas Commun, 27(5):797-813.

[3]Li P, Guo S, Yu S, et al., 2012. CodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. Proc IEEE INFOCOM, p.100-108.

[4]Li SH, Mei ZH, 2016. Homomorphic signature scheme for network coding against inter-generation pollution attacks. Comput Technol Dev, 26(10):73-76 (in Chinese).

[5]Li ZP, Li BC, Lau LC, 2009. A constant bound on throughput improvement of multicast network coding in undirected networks. IEEE Trans Inform Theory, 55(3):1016-1026.

[6]Niu SF, Li WT, Wang CF, 2020. New efficient certificateless broadcast multi-signature scheme. Appl Res Comput, 37(8):2464-2467 (in Chinese).

[7]Papailiopoulos DS, Luo JQ, Dimakis AG, et al., 2012. Simple regenerating codes: network coding for cloud storage. Proc IEEE INFOCOM, p.2801-2805.

[8]Peng TL, Shang T, Liu JW, 2015. Signature scheme for network coding against inter-generation pollution attacks. J Beijing Univ Aeronaut Astronaut, 41(4):721-726 (in Chinese).

[9]Wang HP, Mei ZH, 2016. A scheme against pollution attacks based on secure network coding. Comput Technol Dev, 26(7):94-99 (in Chinese).

[10]Wang L, Zhang Z, Zhang H, et al., 2019. A RSA-based secure network coding scheme against multiple attacks. Comput Eng, 45(11):166-171 (in Chinese).

[11]Xu CD, Wang HQ, 2021. Sequential multi-signature scheme based on blockchain. J Nanjing Univ Posts Telecommun (Nat Sci Ed), 41(2):85-94 (in Chinese).

[12]Xu J, Liu YT, Xia GY, et al., 2016. Network coding based topology inference: a survey. Comput Sci, 43(S1):242-248, 264 (in Chinese).

[13]Yu HF, Gao XZ, 2019. Homomorphic ring signature scheme technology for multi-source network coding. Netinfo Secur, (2):36-42 (in Chinese).

[14]Yu HF, Li W, 2019. Homomorphic signature schemes for single-source and multi-source network coding. J Commun, 40(11):112-121 (in Chinese).

[15]Yu HF, Li W, 2020. A certificateless signature for multi-source network coding. J Inform Secur Appl, 55:102655.

[16]Yu HF, Wang WK, 2021. Certificateless network coding ring signature scheme. Secur Commun Netw, 2021:8029644.

[17]Zhou ZB, Xu L, 2016. Pollution-resistant network coding scheme based on digital signature. Comput Syst Appl, 25(6):185-190 (in Chinese).

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2022 Journal of Zhejiang University-SCIENCE