Font Size: a A A

Studies On Certificateless Linearly Homomorphic Signature Scheme For Network Coding

Posted on:2024-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:M X SongFull Text:PDF
GTID:2568307148988189Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As an emerging technology,the Internet of Things helps more and more intelligent terminals to widely collect and exchange data,bringing convenience to people’s daily life.With the proliferation of shared data and the increasing scale of the Io T,how to increase throughput in vast distributed networks is critical.As an effective mechanism,network coding technology has been proved to enhance the robustness of the network and maximize the throughput of the network.It is widely used in various computer network systems.However,in Io T systems where network coding is deployed,Io T devices often interact with third-party applications,making the network-coded packet mixing nature vulnerable to contamination attacks,which may prevent the recovery of the original data.Although there are many security schemes to resist pollution attacks,no one has proposed a scheme that supports both linear homomorphic signature and certificateless feature.Therefore,this article focuses on the construction,scheme design and security of certificateless linear homomorphic signature,centering on the data pollution attack problem of network coding in the Io T environment.The main substance of this study are as follows:(1)This article studies certificate-based linear homomorphic signature and identity-based linear homomorphic signature in homomorphic signatures.Aiming at the problems of cumbersome certificate management and insecure key escrow in homomorphic signatures in the past,this article combines with certificateless public key cryptosystem,puts forwards the conception of certificateless linear homomorphic signature for network coding,including the formal definition and security model.(2)Centering on the problem of data pollution attacks,a network coding system model suitable for the Io T environment is constructed.Using CDH assumption and bilinear mapping as cryptography tools,this article proposes a certificateless linear homophily signature scheme CL-LHS Ⅰ,and proves the scheme is unforgeable in the random oracle model.Specifically,CL-LHS Ⅰ can not only resist adaptive selection data set attacks against two types of adversaries,but also protect the privacy of users.(3)In order to construct and implement more certificateless linear homomorphic signature schemes,this article combines with the characteristics of certificateless public auditing protocol in cloud storage and the properties of certificateless linear homomorphic signature in network coding,and designs a general construction method,which can transform the certificateless public auditing protocol with some properties into certificateless linear homomorphic signature schemes.In addition,a instantiated scheme CL-LHS Ⅱ is proposed according to this method.(4)Finally,the communication overhead and computational cost of the two schemes CL-LHS Ⅰ and CL-LHS Ⅱ are analyzed theoretically,and the generation and verification of the signatures are evaluated by experiments.When the block dimension is50,the total consumption of the two schemes is 1113.65 ms and 690.30 ms respectively.The results indicate that the proposed certificateless linear homophomic signature schemes CL-LHS Ⅰ and CL-LHS Ⅱ are secure and efficient,and can be deployed in the Io T system with network coding.
Keywords/Search Tags:information security, network coding, linearly homomorphic signature, certificateless public key cryptosystem
PDF Full Text Request
Related items