信息网络安全 ›› 2019, Vol. 19 ›› Issue (5): 69-76.doi: 10.3969/j.issn.1671-1122.2019.05.009

• 技术研究 • 上一篇    下一篇

一种有效抗污染攻击的混合网络编码方案

王雅旋, 林喜军, 曲海鹏()   

  1. 中国海洋大学信息科学与工程学院,山东青岛 266100
  • 收稿日期:2019-01-21 出版日期:2019-05-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:王雅旋(1992—),女,福建,硕士研究生,主要研究方向为密码学、信息安全;林喜军(1977—),男,山东,副教授,博士,主要研究方向为密码学、信息安全;曲海鹏(1972—),男,山东,副教授,博士,主要研究方向为密码学、信息安全。

  • 基金资助:
    国家自然科学基金[61827810];国家重点研发计划[2016YFB1001103]

An Effective Hybrid Network Coding Scheme Against Pollution Attacks

Yaxuan WANG, Xijun LIN, Haipeng QU()   

  1. College of Information Science and Engineering, Ocean University of China, Qingdao Shandong 266100, China
  • Received:2019-01-21 Online:2019-05-10 Published:2020-05-11

摘要:

密码学研究者们使用同态签名或同态MAC方案来保障网络编码环境中消息的完整性。然而,随着数据量的增加,同态签名方案的计算开销越来越大;同态MAC方法虽然能够有效地节省计算开销,但是存在标签污染和代间污染问题。为了更有效地保障网络编码中消息的完整性,提高系统的性能,文章提出一种结合同态MAC方案和同态签名方案的混合网络编码方案,利用同态MAC方案为传输的数据包生成一个标签集合,然后对标签集合进行签名。在方案设计中引入了消息的代标识符,中间节点可以依据消息的代标识符对来自同一代消息的数据包进行网络编码。中间节点通过对签名和标签的双重验证来及时发现并丢弃受污染的数据包。经过安全分析,该方案实现了同时抵抗数据污染、标签污染和代间污染三种污染攻击的功能。

关键词: 网络编码, 标签污染, 代间污染, 同态MAC, 同态签名

Abstract:

Cryptographic researchers use homomorphic signatures or homomorphic MAC methods to ensure message integrity in network coding environments. However, with the increase of the amount of data, the homomorphic signature method has more and more overhead. Although the homomorphic MAC method can effectively reduce the overhead, there are tag pollution and intergenerational pollution problems. In order to more effectively guarantee the integrity of the message in the network coding and improve the system performance, this paper proposes a hybrid network coding scheme combining homomorphic MAC and homomorphic signature, and uses the homomorphic MAC method to generate a label set for the transmitted data packet. Then sign the tag collection. The generation identifier of the message is introduced in the scheme design, and the intermediate node can perform network coding on the data packet from the same generation message according to the generation identifier of the message. The intermediate node can discover and discard contaminated data packets in time through double verification of signatures and labels. Through the safety analysis, the scheme realizes the functions of resisting data pollution, tag pollution and intergenerational pollution.

Key words: network coding, tag pollution, intergenerational pollution, homomorphic MAC, homomorphic signature

中图分类号: