Paper 2006/025
Signatures for Network Coding
Denis Charles, Kamal Jain, and Kristin Lauter
Abstract
This paper presents a practical digital signature scheme to be used in conjunction with network coding. Our scheme simultaneously provides authentication and detects malicious nodes that intentionally corrupt content on the network. The homomorphic property of the signatures allows nodes to sign any linear comination of the incoming packets without contacting the signing authority, but it is computationally infeasible for a node to sign a linear combination of the packets without disclosing what linear combination was used in the generation of the packet. Furthermore, we prove that the signature scheme is secure under well known cryptographic assumptions of the hardness of the Discrete-Log problem and the computational co-Diffie-Hellman problem on elliptic curves. Our scheme has a three-fold advantage over schemes based on homomorphic hashing: Firstly, we do not need to securely transmit hash values of the packets that the source transmits; secondly, since our scheme is based on elliptic curves, smaller security parameters suffice and this translates to improved efficiency since the bit lengths involved are smaller; finally, our scheme provides authentication of the data in addition to detecting pollution of packets.
Note: Corrections to references.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Digital signatureselliptic curvesnetwork codingWeil pairing
- Contact author(s)
- klauter @ microsoft com
- History
- 2006-02-16: last of 3 revisions
- 2006-01-23: received
- See all versions
- Short URL
- https://ia.cr/2006/025
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2006/025, author = {Denis Charles and Kamal Jain and Kristin Lauter}, title = {Signatures for Network Coding}, howpublished = {Cryptology {ePrint} Archive, Paper 2006/025}, year = {2006}, url = {https://eprint.iacr.org/2006/025} }