2015
DOI: 10.1002/sec.1321
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of a homomorphic signature scheme for network coding

Abstract: Recently, Liu and Wang proposed a homomorphic signature scheme for network coding, which was claimed to resist against pollution attacks. However, we show that in Liu and Wang's scheme, after several generations, the adversary is able to launch a successful forgery attack with a high probability. Therefore, Liu and Wang's scheme is not secure. After analyzing the cause of the attack, an improved scheme is given, which can combat against the proposed attack in an efficient way. Copyright © 2015 John Wiley & Son… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…According to (13) and (14), computing γ 1 consumes one bilinear map operation whereas computing γ 2 consumes one bilinear map operation, m + n + 1 exponentiations, and m + n + 1 multiplications. Therefore, we have…”
Section: Performance Evaluation a Communication Overheadmentioning
confidence: 99%
“…According to (13) and (14), computing γ 1 consumes one bilinear map operation whereas computing γ 2 consumes one bilinear map operation, m + n + 1 exponentiations, and m + n + 1 multiplications. Therefore, we have…”
Section: Performance Evaluation a Communication Overheadmentioning
confidence: 99%
“…Homomorphic and data aggregation schemes are also widely used in other fields. In [23], Cheng et al present an improved scheme after analyzing the security of the homomorphic signature scheme of network coding, which can effectively deal with the proposed attack. Liu et al [24] propose a privacy-preserving health data aggregation scheme based on differential privacy, which not only resists against various attacks, but also achieves the robustness.…”
Section: Related Workmentioning
confidence: 99%
“…Liu and Wang [26] proposed a novel homomorphic signature scheme using a dynamic public key technique, which not only can resist intra-generation pollution attacks but also can prevent inter-generation pollution attacks. Chen et al [27] introduced an improved homomorphic signature scheme. Zhang et al [31] presented a hybrid-key cryptographic method and the source node produce a number of MACs and a signature for every transmitted message.…”
Section: Related Workmentioning
confidence: 99%