Homomorphic signatures for network coding information
Network coding has been shown to optimally use bandwidth in a network, maximizing information flow but the scheme is very inherently vulnerable to pollution attacks by malicious nodes in the network. A node injecting garbage can quickly affect many receivers. The pollution of network packets spreads quickly since the output of (even an) honest node is corrupted if at least one of the incoming packets is corrupted.
An attacker can easily corrupt a packet even if it is encrypted by either forging the signature or by producing a collision under the hash function. This will give an attacker access to the packets and the ability to corrupt them. Denis Charles, Kamal Jain and Kristin Lauter designed a new homomorphic encryption signature scheme for use with network coding to prevent pollution attacks.[1]
The homomorphic property of the signatures allows nodes to sign any linear combination of the incoming packets without contacting the signing authority. In this scheme it is computationally infeasible for a node to sign a linear combination of the packets without disclosing what linear combination was used in the generation of the packet. Furthermore, we can prove that the signature scheme is secure under well known cryptographic assumptions of the hardness of the discrete logarithm problem and the computational Elliptic curve Diffie–Hellman.
^"Signatures for Network Coding". 2006. CiteSeerX 10.1.1.60.4738. Archived from the original on 2021-11-20. {{cite journal}}: Cite journal requires |journal= (help)
and 18 Related for: Homomorphic signatures for network coding information
new homomorphic encryption signature scheme for use with networkcoding to prevent pollution attacks. The homomorphic property of the signatures allows...
pairing Pairing-based cryptography Boneh–Franklin scheme HomomorphicSignaturesforNetworkCoding Silverman, Joseph (1986). The Arithmetic of Elliptic Curves...
password management, homomorphic key management, and private set intersection. An OPRF can be viewed as a special case of homomorphic encryption, as it enables...
improper disclosure during processing, such as by a cloud service for example. Homomorphic encryption and secure multi-party computation are emerging techniques...
hypothesis upon which this cryptosystem is based. The scheme is an additive homomorphic cryptosystem; this means that, given only the public key and the encryption...
later when secure homomorphic encryption algorithms were finally developed. Rivest was one of the inventors of the GMR public signature scheme, published...
Taher Elgamal, designer of this and other cryptosystems ElGamal signature scheme Homomorphic encryption A. J. Menezes; P. C. van Oorschot; S. A. Vanstone...
and asymmetric cryptography including RSA, ECC, digital signatures, hybrid encryption, homomorphic encryption, and Diffie–Hellman key exchange. Methods from...
component in advancing the world of computing: the Internet, Cellular networks, and Cloud computing, Information privacy, Privacy engineering, Anonymity...
R, Hoshino Y, Ohmido N, Onodera Y (June 2015). "Evidence for a Common Origin of Homomorphic and Heteromorphic Sex Chromosomes in Distinct Spinacia Species"...
verifiability in 2017. Tally verification is done by mixnet, making use of homomorphic properties and elGamal encryption provided by Douglas Wikström. Universal...
structure Byzantine fault tolerance Erasure code – When the data to be reconstructed is not a secret Homomorphic secret sharing – A simplistic decentralized...
(denoted 2n) and produces spores. The gametophyte and sporophyte phases may be homomorphic, appearing identical in some algae, such as Ulva lactuca, but are very...
There are public-key encryption algorithms, homomorphic encryption algorithms, and RLWE digital signature algorithms in addition to the public key, key...
{Z} )^{*}} where n is a product of two large primes. This scheme is homomorphic and hence malleable. Given block size r, a public/private key pair is...
extraction, comparison, and result aggregation, all implemented with a homomorphic cipher, to allow a biometric server to confirm a user without knowing...