2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) 2016
DOI: 10.1109/iscisc.2016.7736444
|View full text |Cite
|
Sign up to set email alerts
|

An identity-based digital signature scheme to detect pollution attacks in intra-session network coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…However, it increases transmission overhead, since the size of an RSA signature is typically very large. The authors of [28] proposed an identity-based digital signature scheme to detect pollution attacks in intra-session network coding. Their scheme does not involve a third-party query to certificate authority and does not have the key issue, and it does not take into consideration the energy consumption parameter in resource-constrained WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…However, it increases transmission overhead, since the size of an RSA signature is typically very large. The authors of [28] proposed an identity-based digital signature scheme to detect pollution attacks in intra-session network coding. Their scheme does not involve a third-party query to certificate authority and does not have the key issue, and it does not take into consideration the energy consumption parameter in resource-constrained WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…After that, various homomorphic signature schemes have been investigated. For instance, linearly homomorphic signature schemes [14,[17][18][19]28,29], polynomial homomorphic signature schemes [30,31], fully homomorphic signature schemes [32] and the homomorphic aggregate signature schemes [33]. Among these, linearly homomorphic signature schemes are particularly useful in linear network coding.…”
Section: Related Workmentioning
confidence: 99%
“…To alleviate the burden of certificate management, some schemes are proposed based on an identity‐based public cryptosystem. [18–20,35,36] are concerned with identity‐based linearly homomorphic signature schemes for network coding against pollution attacks. Jiang et al.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, SadrHaghighi et al proposed an ''identitybased digital signature scheme'' [39] to detect pollution attacks in intra-session network coding which does not involve a third-party query to certificate authority and eliminates the key escrow problem. Moreover, in [13], Cheng et al proposed two improved key distribution schemes for HSS [8] and KEPTE [40], respectively, to combat multi-generation pollution attacks.…”
Section: B Mitigating Pollution Attacksmentioning
confidence: 99%