[1] |
AHLSWEDE R , AIN , LI S Y R ,et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000,46(4): 1204-1216.
|
[2] |
YU Z , WEI Y , RAMKUMAR B ,et al. An efficient signature-based scheme for securing network coding against pollution attacks[C]// IEEE INFOCOM 2008-The 27th Conference on Computer Communications. IEEE, 2008: 1409-1417.
|
[3] |
YUN A , CHEON J H , KIM Y . On homomorphic signatures for network coding[J]. IEEE Transactions on Computers, 2010,59(9): 1295-1296.
|
[4] |
BONEH D , FREEMAN D , KATZ J ,et al. Signing a linear subspace:signature schemes for network coding[C]// International Workshop on Public Key Cryptography. Springer, 2009: 68-87.
|
[5] |
LI Y , LUI J C S . Identifying pollution attackers in network-coding enabled wireless mesh networks[C]// International Conference on Computer Communications & Networks. IEEE, 2011.
|
[6] |
CHARLES D , JAIN K , LAUTER K . Signatures for network coding[J]. International Journal of Information and Coding Theory, 2009,1(1):3.
|
[7] |
WANG Y . Insecure provably secure network coding and homomorphic authentication schemes for network coding[J]. IACR Cryptology ePrint Archive, 2010: 1-9.
|
[8] |
HE M , CHEN L , WANG H ,et al. Adapkeys:an adaptive security scheme for network coding[C]// IEEE Asia-pacific Services Computing Conference. IEEE Computer Society, 2012.
|
[9] |
裴恒利, 尚涛, 刘建伟 . 融合时间戳和同态签名的安全网络编码方法[J]. 通信学报, 2013,34(4): 28-35.
|
|
PEI H L , SHANG T , LIU J W . A secure network coding method based on time stamp and homomorphic signature[J]. Journal on Communications, 2013,34(4): 28-35.
|
[10] |
蒙云番, 孙光昊, 邢杰 ,等. 基于网络编码和ECC的无线体域网安全签名方案[J]. 电讯技术, 2015,55(6): 605-610.
|
|
MENG Y F , SUN G B , XING J ,et al. Wireless body area network security signature scheme based on network coding and ECC[J]. Telecommunications Technology, 2015,55(6): 605-610.
|
[11] |
WU X , XU Y , YUEN C ,et al. A tag encoding scheme against pollution attack to linear network coding[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 33-42.
|
[12] |
CHENG C , LEE J , JIANG T ,et al. Security analysis and improvements on two homomorphic authentication schemes for network coding[J]. IEEE Transactions on Information Forensics and Security, 2017,11(5): 993-1002.
|
[13] |
AGRAWAL S , BONEH D , BOYEN X ,et al. Preventing pollution attacks in multi-source network coding[C]// International Workshop on Public Key Cryptography. Springer-Verlag, 2010.
|
[14] |
YANG H , YANG M . An unconditionally secure authentication code for multi-source network coding[J]. International Journal of Wireless and Microwave Technologies (IJWMT), 2012,2(1):45.
|
[15] |
ZHANG J , SHAO J , LING Y ,et al. Efficient multiple sources network coding signature in the standard model[J]. Concurrency and Computation:Practice and Experience, 2015,27(10): 2616-2636.
|
[16] |
LE A , MARKOPOULOU A . Cooperative defense against pollution attacks in network coding using spacemac[J]. IEEE Journal on Selected Areas in Communications, 2012,30(2): 442-449.
|
[17] |
LI T , CHEN W , TANG Y ,et al. A homomorphic network coding signature scheme for multiple sources and its application in IoT[J]. Security and Communication Networks, 2018,2018: 1-6.
|
[18] |
俞惠芳, 高新哲 . 多源网络编码同态环签名方案研究[J]. 信息网络安全, 2019,19(2): 36-42.
|
|
YU H F , GAO X Z . Homomorphic ring signature technology for multi-source network coding[J]. Netinfo Security, 2019,19(2): 36-42.
|
[19] |
彭勇, 严文杰, 陈俞强 . 一种多源网络编码同态签名算法[J]. 合肥工业大学学报(自然科学版), 2014,37(3): 310-313.
|
|
PENG Y , YAN W J , CHEN Y Q . A multi-source network coded homomorphic signature algorithm[J]. Journal of Hefei University of Technology (Natural Science), 2014,37(3): 310-313.
|
[20] |
牛淑芬, 王彩芬, 张玉磊 ,等. 多源网络编码数据完整性验证方案[J]. 计算机工程, 2015,41(3): 21-25.
|
|
NIU S F , WANG C F , ZHANG Y L ,et al. Data integrity verification scheme for multi-source network coding[J]. Computer Engineering, 2015,41(3): 21-25.
|
[21] |
王起月 . 基于椭圆曲线的数字签名算法研究[D]. 洛阳:河南科技大学, 2018.
|
|
WANG Q Y . Research on digital signature algorithm based on elliptic curve[D]. Luoyang:Henan University of Science and Technology, 2018.
|
[22] |
CHEND C , JIANG T , LIU Y ,et al. Security analysis of a homomorphic signature scheme for network coding[J]. Security and Communication Networks, 2015,8(18): 4053-4060.
|
[23] |
罗海, 王彩芬, 冯帆 ,等. 多源网络编码同态签名方案[J]. 计算机应用研究, 2011,28(4): 1465-1469.
|
|
LUO H , WANG C F , FENG F ,et al. On homomorphic signature scheme for multi-source network coding[J]. Application Research of Computers, 2011,28(4): 1465-1469.
|
[24] |
于志轩, 王彩芬 . 改进的网络编码签名验证方案[J]. 计算机工程, 2012,38(7): 122-124.
|
|
YU Z X , WANG C F . Improved verification scheme for network coding signature[J]. Computer Engineering, 2012,38(7): 122-124.
|
[25] |
杨铭熙, 罗蛟, 李腊元 . 多源网络编码签名[J]. 中国通信, 2010,7(1): 131-137.
|
|
YANG M X , LUO J , LI L Y . Signatures for multi-source network coding[J]. China Communications, 2010,7(1): 131-137.
|
[26] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// Annual International Cryptology Conference. Springer, 2001.
|