Netinfo Security ›› 2019, Vol. 19 ›› Issue (2): 36-42.doi: 10.3969/j.issn.1671-1122.2019.02.005
Previous Articles Next Articles
Received:
2018-05-15
Online:
2019-02-10
Published:
2020-05-11
CLC Number:
Huifang YU, Xinzhe GAO. Homomorphic Ring Signature Scheme Technology for Multi-source Network Coding[J]. Netinfo Security, 2019, 19(2): 36-42.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.02.005
[1] | YUN A, CHEON J H, KIM Y.On Homomorphic Signatures for Network Coding[J]. IEEE Transactions on Computers, 2010, 59(9):1295-1296. |
[2] | ZHAO F,KALKER T,MEDARED M.Signature for Content Distribution with Network Coding[C]//IEEE.Symposium on Information Theory,November 12-15, 2006, Washington.New York:IEEE,2007:556-560. |
[3] | ZHOU Xiuyuan, WANG Caifen, LUO Hai.Multi-source Network Coding Signature Scheme Based on RSA[J]. Computer Engineering and Design, 2012, 33(5): 1752-1756. |
周秀媛,王彩芬,罗海. 基于RSA的多源网络编码签名方案[J]. 计算机工程与设计,2012,33(5):1752-1756. | |
[4] | NIU ShuFen, WANG CaiFen.Homomorphic Signature Algorithm for Multi-source Linear Network Coding[J]. Computer Engineering, 2012, 38(2): 126-128. |
牛淑芬,王彩芬. 多源线性网络编码的同态签名算法[J]. 计算机工程,2012,38(2):126-128. | |
[5] | LIU Guangjun, WANG Bin.A Secure Network Coding Scheme Against Internal/External Pollution Attacks[J]. China Communications, 2013, 10(8): 100-110. |
刘光军,王斌. 抗代内/外污染攻击的安全网络编码方案[J]. 中国通信,2013,10(8):100-110. | |
[6] | LUO Q, YANG G, SHE K, et al.Quantum Homomorphic Signature Using Coherent States[C]// IEEE. 2016 2nd IEEE International Conference on Computer and Communications (ICCC). October 14-17, 2016. Chengdu, China.New York:IEEE, 2017:1052-1055. |
[7] | PEI Hengli, SHANG Tao, LIU Jianwei.A Secure Network Coding Method Based on Time Stamp and Homomorphic Signature[J]. Journal of Computation, 2013, 34(4): 28-35. |
裴恒利,尚涛,刘建伟. 融合时间戳和同态签名的安全网络编码方法[J]. 通信学报,2013,34(4):28-35. | |
[8] | MENG Yunfan, SUN Guangbiao, XING Jie, et al.Wireless Body Area Network Security Signature Scheme Based on Network Coding and ECC[J]. Telecommunications Technology, 2015, 55(6): 605-610. |
蒙云番,孙光昊,邢杰,等. 基于网络编码和ECC的无线体域网安全签名方案[J]. 电讯技术,2015,55(6): 605-610. | |
[9] | LUO Peng, YANG Xiaoyuan.Multi-PKG Identity-based Encryption Scheme Based on Ring Signature[J]. Journal of Shandong Uuiversity(Natural Sciences), 2017, 52(6): 64-68. |
罗鹏,杨晓元. 基于环签名的支持多PKG身份基加密方案[J]. 山东大学学报(理学版) ,2017,52(6):64-68. | |
[10] | LIU G J,LIU B Y,LIU X M, et al.Low-Complexity Secure Network Coding Against Wiretapping Using Intra/Inter-generation Coding[J]. China Communications,2015, 12(6):116-125. |
[11] | LEE S H, MARIO G, HUGO K, et al.Performance Evaluation of Secure Network Coding Using Homomorphic Signature[C]//IEEE. 2011 International Symposium on Networking Coding, July 25-27, 2011,Beijing, China.New York: IEEE, 2011:1-6. |
[12] | HE M, CHEN L, WANG H,et al.Survey on Secure Transmission of Network Coding in Wireless Networks[C]//IEEE. 2012 International Conference on Computer Science and Service System, August 11-13, 2012, Nanjing, China.New York:IEEE,2012:1216-1219. |
[13] | PENG Yong, CHEN Yuqiang, YAN Wenjie.A Secure Multi-source Network Coding Signature Algorithm[J]. Computer Engineering and Applications, 2012, 48(30): 135-139. |
彭勇,陈愈强,严文杰. 一种安全的多源网络编码签名算法[J]. 计算机工程与应用,2012,48(30):135-139. | |
[14] | PENG Tianli, SHANG Tao, LIU Jianwei.Network Coded Signature Scheme for Anti-generation Pollution Attack[J]. Beijing Aerospace Journal, 2015, 41(4): 721-726. |
彭天丽,尚涛,刘建伟. 抗代间污染攻击的网络编码签名方案[J]. 北京航空航天大报,2015,41(4):721-726. | |
[15] | ZHOU Zhaobin, XU Li.Anti-pollution Network Coding Scheme Based on Digital Signature[J]. Journal of Computer Systems, 2016, 25(6): 185-190. |
周赵斌,许力. 基于数字签名的防污染网络编码方案[J]. 计算机系统应用,2016,25(6):185-190. | |
[16] | FAN C I, SUN W Z, HUANG V S.Provably Secure Randomized Blind Signature Scheme Based on Bilinear Pairing[J]. Computers and Mathematics with Applications,2010,60(2): 285-293. |
[17] | WANG Wenqiang, CHEN Shaozhen.An Identity-based Efficient Ring Signature Scheme[J]. Journal of Computer Applications, 2009, 29(11): 2990-2992. |
王文强,陈少真. 一种基于身份的高效环签名方案[J]. 计算机应用,2009,29(11):2990-2992. | |
[18] | PENG Yong, YAN Wenjie, CHEN Yuqiang.A Multi-source Network Coded Homomorphic Signature Algorithm[J]. Journal of Hefei University of Technology(Natural Science), 2014, 37(3): 310-313. |
彭勇,严文杰,陈俞强. 一种多源网络编码同态签名算法[J]. 合肥工业大学学报(自然科学版) ,2014,37(3):310-313. | |
[19] | LI Jianmin, YU Huifang, ZHAO Chen.Self-certified Blind Signcryption Protocol for UC Security[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(6): 932-940. |
李建民,俞惠芳,赵晨. UC安全的自认证盲签密协议[J]. 计算机科学与探索, 2017,11(6):932-940. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||