Loading...
Please wait, while we are loading the content...
Similar Documents
Homomorphic Subspace MAC Scheme for Secure Network Coding
| Content Provider | Semantic Scholar |
|---|---|
| Author | Liu, Guang-Jun Wang, Xiao |
| Copyright Year | 2013 |
| Abstract | Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r–1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node. Keywords: Network coding, pollution attacks, homomorphic MAC, network security, homomorphic cryptography. |
| Starting Page | 173 |
| Ending Page | 176 |
| Page Count | 4 |
| File Format | PDF HTM / HTML |
| DOI | 10.4218/etrij.13.0212.0166 |
| Volume Number | 35 |
| Alternate Webpage(s) | http://ocean.kisti.re.kr/downfile/volume/etri/HJTODO/2013/v35n1/HJTODO_2013_v35n1_173.pdf |
| Alternate Webpage(s) | https://doi.org/10.4218/etrij.13.0212.0166 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |