Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding

来源 :Wuhan University Journal of Natural Sciences | 被引量 : 0次 | 上传用户:buxingzhe3
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to detect and locate the malicious nodes. We also prove the security property of the scheme theoretically. Its effectiveness is demonstrated, and overhead is analyzed through extensive experiments. Network paper can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to detect and locate the malicious nodes. We also prove the security property of the scheme theoretically. Its effectiveness is demonstrated, and overhead is analyzed through extensive experiments.
其他文献
鸡西矿业集团公司张辰煤矿西三采区3
傅抱石先生(一九○四—一九六五)是我国现代著名的山水画家、美术教育家、美术史家、篆刻艺术家。他在美术方面有着多方面的才华,在中国画、篆刻、美术理论方面都做出了卓越
  In this paper, we focus on the fuzzy keyword search problem over the encrypted cloud data in the cloud computing and propose a novel Two-Step-Bloom-Secure-F
  In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, ex pansion, and permuted choices.They
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationall
期刊
  In this paper, the cyclic code of the classic circuit is transformed and transplanted; then, the quantum encoding scheme based on cyclic code and quantum er
一.目的:   目前肾移植术已较为成熟,在经历了手术技术、宿主对异体器官排斥反应的困难之后,术后感染已成为器官移植病人的重要并发症和死亡原因,其中肺部感染最为常见。鉴于
本试验用新型栽培种(A)、普通栽培种(T)和能产生2n花粉(FDR)的二倍体杂种(D)以不完全双列杂交设计配制杂种并产生5个杂种群体(TA、TD、AD、AA及TT).这些群体的无性系按完全随
  The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend.In this paper, we design a mobile botnet, which
期刊