메뉴 건너뛰기




Volumn 62, Issue 10, 2013, Pages 2096-2100

An efficient homomorphic MAC with small key size for authentication in network coding

Author keywords

Homomorphic message authentication code; Network coding; Pollution attack

Indexed keywords

COMMUNICATION OVERHEADS; FINITE FIELDS; KEY SIZES; MESSAGE AUTHENTICATION CODES; POLLUTION ATTACK; SECURITY PARAMETERS; SECURITY REQUIREMENTS;

EID: 84883413291     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2012.135     Document Type: Article
Times cited : (32)

References (25)
  • 3
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale content distribution
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • C. Gkantsidis and P.R. Rodriguez, "Network Coding for Large Scale Content Distribution," Proc. IEEE INFOCOM, pp. 2235-2245, 2005. (Pubitemid 41382341)
    • (2005) Proceedings - IEEE INFOCOM , vol.4 , pp. 2235-2245
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 4
    • 34548321654 scopus 로고    scopus 로고
    • Network coding for distributed storage systems
    • DOI 10.1109/INFCOM.2007.232, 4215814, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • A.G. Dimakis, P.B. Godfrey, M.J. Wainwright, and K. Ramchandran, "Network Coding for Distributed Storage Systems," Proc. IEEE INFOCOM, pp. 2000-2008, 2007. (Pubitemid 47334432)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2000-2008
    • Dimakis, A.G.1    Godfrey, P.B.2    Wainwright, M.J.3    Ramchandran, K.4
  • 6
    • 79959817037 scopus 로고    scopus 로고
    • Practical defenses against pollution attacks in wireless network coding
    • May 2011
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Wireless Network Coding," ACM Trans. Information and System Security, vol. 14, no. 1, pp. 7:1-7:31, May 2011.
    • ACM Trans. Information and System Security , vol.14 , Issue.1 , pp. 71-731
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 7
    • 3543050732 scopus 로고    scopus 로고
    • On-The-fly verification of rateless erasure codes for efficient content distribution
    • M. Krohn, M. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," Proc. IEEE Symp. Security and Privacy, pp. 226-240, 2004.
    • (2004) Proc IEEE Symp. Security and Privacy , pp. 226-240
    • Krohn, M.1    Freedman, M.2    Mazieres, D.3
  • 10
    • 77955178649 scopus 로고    scopus 로고
    • On homomorphic signatures for network coding
    • Mar. 2010
    • A. Yun, J.H. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding," IEEE Trans. Computers, vol. 59, no. 9, pp. 1295-1296, Mar. 2010.
    • IEEE Trans. Computers , vol.59 , Issue.9 , pp. 1295-1296
    • Yun, A.1    Cheon, J.H.2    Kim, Y.3
  • 11
    • 84655169995 scopus 로고    scopus 로고
    • An authentication code against pollution attacks in network coding
    • June
    • F. Oggier and H. Fathi, "An Authentication Code against Pollution Attacks in Network Coding," IEEE/ACM Trans. Networking, vol. 16, no. 3, pp. 497-510, June 2011.
    • (2011) IEEE/ACM Trans. Networking , vol.16 , Issue.3 , pp. 497-510
    • Oggier, F.1    Fathi, H.2
  • 13
    • 80052878696 scopus 로고    scopus 로고
    • Detection and recovery from pollution attacks in coding based distributed storage schemes
    • Dec
    • L. Buttyan, L. Czap, and I. Vajda, "Detection and Recovery from Pollution Attacks in Coding Based Distributed Storage Schemes," IEEE Trans. Dependable and Secure Computing, vol. 8, no 6, pp. 824-838, Dec. 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.6 , pp. 824-838
    • Buttyan, L.1    Czap, L.2    Vajda, I.3
  • 18
    • 84856294814 scopus 로고    scopus 로고
    • Cooperative defense against pollution attacks in network coding using spaceMac
    • A. Le and A. Markopoulou, "Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac," IEEE J. Selected Areas in Communications, vol. 30, no. 2, pp. 442-449, 2012.
    • (2012) IEEE J. Selected Areas in Communications , vol.30 , Issue.2 , pp. 442-449
    • Markopoulou, A.1
  • 19
    • 79960873240 scopus 로고    scopus 로고
    • Padding for orthogonality: Efficient subspace authentication for network coding
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for Orthogonality: Efficient Subspace Authentication for Network Coding," Proc. IEEE INFOCOM, pp. 1026-1034, 2011.
    • (2011) Proc IEEE INFOCOM , pp. 1026-1034
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.6
  • 23
    • 82155162441 scopus 로고    scopus 로고
    • A novel homomorphic mac scheme for authentication in network coding
    • Nov. 2011
    • C. Cheng and T. Jiang, "A Novel Homomorphic MAC Scheme for Authentication in Network Coding," IEEE Comm. Letters, vol. 15, no. 11, pp. 1228-1230, Nov. 2011.
    • IEEE Comm. Letters , vol.15 , Issue.11 , pp. 1228-1230
    • Cheng, C.1    Jiang, T.2
  • 25
    • 63149146072 scopus 로고    scopus 로고
    • Fast galois field arithmetic library in c/c++
    • Univ. of Tennessee Mar
    • J.S. Plank, "Fast Galois Field Arithmetic Library in C/C++," Technical Report UT-CS-07-593, Univ. of Tennessee, Mar. 2007.
    • (2007) Technical Report UT-CS-07-593
    • Plank, J.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.