logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 12 : 229301(2021) https://doi.org/10.1007/s11432-020-2997-0

Secure network coding from secure proof of retrievability

More info
  • ReceivedMar 23, 2020
  • AcceptedJul 6, 2020
  • PublishedMay 24, 2021

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61672416, 61872284, 61772514, 61672059), in part by National Key RD Program of China (Grant No. 2017YFB1400700), and in part by Beijing Municipal Science Technology Commission (Grant No. Z191100007119006).


Supplement

Appendixes A–D.


References

[1] Chang J, Shao B, Ji Y. Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding". IEEE Trans Parallel Distrib Syst, 2020, 31: 2618-2619 CrossRef Google Scholar

[2] Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: Signature schemes for network coding. In: Proceedings of International Workshop on Public Key Cryptography. Berlin: Springer, 2009. 68--87. Google Scholar

[3] Chang J, Wang H, Wang F. RKA Security for Identity-Based Signature Scheme. IEEE Access, 2020, 8: 17833-17841 CrossRef Google Scholar

[4] Agrawal S, Boneh D. Homomorphic MACs: MAC-based integrity for network coding. In: Proceedings of International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2009. 292--305. Google Scholar

[5] Ji Y, Shao B, Chang J. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl Math Computation, 2020, 386: 125478 CrossRef Google Scholar

[6] Chen F, Xiang T, Yang Y. Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans Comput, 2016, 65: 1936-1948 CrossRef Google Scholar

[7] Zhang R, Ma H, Lu Y. Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci China Inf Sci, 2017, 60: 122104 CrossRef Google Scholar

[8] Shacham H, Waters B. Compact Proofs of Retrievability. J Cryptol, 2013, 26: 442-483 CrossRef Google Scholar

qqqq

Contact and support