• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Signing a Linear Subspace: Signature Schemes for Network Coding

Cached

  • Download as a PDF

Download Links

  • [crypto.stanford.edu]
  • [crypto.stanford.edu]
  • [www.stanford.edu]
  • [crypto.stanford.edu]
  • [theory.stanford.edu]
  • [crypto.stanford.edu]
  • [crypto.stanford.edu]
  • [eprint.iacr.org]
  • [theory.stanford.edu]
  • [theory.stanford.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Dan Boneh , David Freeman , Jonathan Katz , Brent Waters
Citations:71 - 8 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Boneh_signinga,
    author = {Dan Boneh and David Freeman and Jonathan Katz and Brent Waters},
    title = {Signing a Linear Subspace: Signature Schemes for Network Coding},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract. Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires intermediate nodes to modify data packets en route; for this reason, standard signature schemes are inapplicable and it is a challenge to provide resilience to tampering by malicious nodes. Here, we propose two signature schemes that can be used in conjunction with network coding to prevent malicious modification of data. In particular, our schemes can be viewed as signing linear subspaces in the sense that a signature σ on V authenticates exactly those vectors in V. Our first scheme is homomorphic and has better performance, with both public key size and per-packet overhead being constant. Our second scheme does not rely on random oracles and uses weaker assumptions. We also prove a lower bound on the length of signatures for linear subspaces showing that both of our schemes are essentially optimal in this regard. 1

Keyphrases

linear subspace    signature scheme    network coding    random oracle    improved robustness    standard signature scheme    per-packet overhead    traditional routing scheme    public key size    data packet    intermediate node    malicious modification    malicious node    second scheme    first scheme   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University