Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Homomorphic signature method for intra-generation/inter-generation attack resistance

A homomorphic and message signature technology, applied in the field of network coding, can solve problems such as large amount of computation, reduce homomorphic signatures, and intergenerational pollution, and achieve high security performance and low computational overhead

Inactive Publication Date: 2017-11-17
XIAN UNIV OF SCI & TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the first time, Krohn et al. proposed the use of homomorphic hash functions to design a verification algorithm for homomorphic signature schemes. This method can detect modified code packets, but it needs to perform a large number of bilinear pairing operations, and cannot realize the instant transmission of data packets.
Yu et al. proposed a homomorphic signature scheme based on RSA, which can greatly reduce the computational complexity of homomorphic signatures, but there are still a large number of modular exponent operations, and there is a serious problem of intergenerational pollution.
The homomorphic signature scheme proposed by Liu et al. sets an independent and unique message generation identifier for each generation of messages, and uses the hash value generated by the message generation identifier to randomly process the key, so as to achieve the purpose of resisting intra-generation and inter-generation attacks. , but the amount of calculation is still large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic signature method for intra-generation/inter-generation attack resistance
  • Homomorphic signature method for intra-generation/inter-generation attack resistance
  • Homomorphic signature method for intra-generation/inter-generation attack resistance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0057] 1. Analyze the correctness of a homomorphic signature method against intra-generational / inter-generational attacks proposed by the present invention:

[0058] Assuming that the nodes are vulnerable to attack, the correctness of the present invention is proved below.

[0059] Proof: Let V=span{s 1 ,s 2 ,...s r }, Sign outputs the message and signature vector u i ={v i ,σ i }, It is easy to know u⊥V from formula (4.3), just prove that Verify(id,v,σ,PK)=1

[0060] because make

[0061] {v,σ}=Combine(id,α i ,v i ,σ i ), (i=1,2,...,l), from the formula (4.5) we can know

[0062]

[0063] Among them, v j and σ j represent the jth and n+j components of u respectively, v ij and σ ij represent u respectively i The jth, n+jth components,

[0064] It can be deduced from u⊥V roll out:

[0065]

[0066] Theorem proved.

[0067] Two, prove the security of the present invention:

[0068] The description of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention, which relates to the technical field of network coding, discloses a homomorphic signature method for intra-generation / inter-generation attack resistance. The method is formed by four polynomial time algorithms of parameter setup, message signing Sign, message combination Combine, and message verification Verify. To be specific, the method comprises: at a preparation stage, each generation of messages are written into an m*(n-1)-dimensional matrix mode, the sum of each row of data is used as a row header, an m*n-dimensional matrix is formed by transformation, and signature information is designed by using first N bits of information in a message vector according to an algorithm; parameter setting (Setup) is carried out; an operation of message signing Sign (SK, id, V'i) is carried out; an operation of message combination combine is carried out; and an operation of message operation Verifiy (id, v, sigma, PK) is carried out. Generation identifier information is applied to signature construction. The data verification algorithm is completed jointly by using a fixed private key and a generation identifier. On the basis of theoretical demonstration, the method is capable of being resistant to the intra-generation / inter-generation attack to realize independent authentication of information of all generations. The method having characteristics of low computing cost and high security is suitable for a real-time communication system.

Description

technical field [0001] The invention relates to the technical field of network coding, in particular to a homomorphic signature method against intra-generation / inter-generation attacks. Background technique [0002] Network coding is vulnerable to pollution attacks by malicious nodes in the network. Information is maliciously tampered or forged after transmission and pollutes the entire network, resulting in information sinks being unable to correctly decrypt information, and network resources may be greatly wasted. [0003] In 2000, after Cai et al. proposed the concept of network coding, network coding was widely used in wireless networks, application layer multicast, P2P file sharing, etc., which greatly improved network throughput and network transmission rate, and effectively improved Network robustness and stability. However, network codes are vulnerable to pollution attacks by malicious nodes. The source information is maliciously tampered or forged, and the code tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32
Inventor 韩晓冰魏海亮刘小斌谭静静王安国
Owner XIAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products