메뉴 건너뛰기




Volumn 54, Issue 1, 2010, Pages 28-40

An efficient dynamic-identity based signature scheme for secure network coding

Author keywords

Identity based cryptography; Network coding; Pollution attacks; Signature

Indexed keywords

BATCH VERIFICATION; FORWARDING NODES; IDENTITY AUTHENTICATION; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED SIGNATURE SCHEME; LINEAR VECTORS; NETWORK CODING; PACKET-BASED; POLLUTION ATTACK; RANDOM FORGERY; SECURE CHANNELS; SECURE NETWORKS; SECURITY ISSUES; SIGNATURE SCHEME; SIMULATION RESULT; TRANSMISSION COSTS;

EID: 73449086635     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.08.006     Document Type: Article
Times cited : (31)

References (40)
  • 6
  • 12
    • 51349135448 scopus 로고    scopus 로고
    • Signature for Network Coding
    • MSR-TR-2005-159, Microsoft, 2005
    • D. Charles, K. Jian, K. Lauter, Signature for Network Coding, Technique Report MSR-TR-2005-159, Microsoft, 2005.
    • Technique Report
    • Charles, D.1    Jian, K.2    Lauter, K.3
  • 13
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An efficient signature-based scheme for securing network coding against pollution attacks, in: Proceedings of IEEE INFOCOM, 2008.
    • (2008) Proceedings of IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 16
    • 73449101877 scopus 로고    scopus 로고
    • A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
    • A. Chou, Y. Wu, Network coding for the internet and wireless networks, MSR-TR-2007-70, Microsoft Research, 2007.
  • 19
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh D., and Franklin M. Identity-based encryption from the weil pairing. Proceedings of Crypto, LNCS 2139 (2001) 213-229
    • (2001) Proceedings of Crypto, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 21
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil pairing
    • Boneh D., Lynn B., and Shacham H. Short Signatures from the Weil pairing. Journal of Cryptology 17 4 (2004) 297-319
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 25
    • 0348155942 scopus 로고    scopus 로고
    • Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
    • Zhang F., Safavi-Naini R., and Susilo W. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. Proceedings of Indocrypt, LNCS 2904 (2003) 191-204
    • (2003) Proceedings of Indocrypt, LNCS , vol.2904 , pp. 191-204
    • Zhang, F.1    Safavi-Naini, R.2    Susilo, W.3
  • 28
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Camenisch J., and Lysyanskaya A. Signature schemes and anonymous credentials from bilinear maps. Proceedings of CRYPTO, LNCS 3152 (2004) 56-72
    • (2004) Proceedings of CRYPTO, LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 29
    • 67349168446 scopus 로고    scopus 로고
    • BAT: a robust signature scheme for vehicular communications using binary authentication tree
    • Jiang Y., Shi M., Shen X., and Lin C. BAT: a robust signature scheme for vehicular communications using binary authentication tree. IEEE Transactions on Wireless Communications 8 4 (2009) 1974-1983
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 31
    • 73449084856 scopus 로고    scopus 로고
    • IEEE Standard 1609.2, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, Security Services for Applications and Management Messages, July, 2006.
    • IEEE Standard 1609.2, IEEE Trial-Use Standard for Wireless Access in Vehicular Environments, Security Services for Applications and Management Messages, July, 2006.
  • 40
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy-preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, X. Shen, An efficient privacy-preserving scheme against traffic analysis attacks in network coding, in: Proceedings of IEEE INFOCOM, 2009.
    • (2009) Proceedings of IEEE INFOCOM
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.