Certificateless Homomorphic Signature Scheme for Network Coding

Homomorphic signature is an extremely important public key authentication technique for network coding to defend against pollution attacks. As a public key cryptographic primitive, it also encounters the same problem of how to confirm the relationship between some public key $pk$ and the identity $ID$ of its owner. In the setting of distributed network coding, the intermediate and destination nodes need to use the public key of source node S to check the validity of vector-signature pairs. Therefore, the binding of S and its corresponding public key becomes crucial. The popular and traditional solution is based on certificates which are issued by a trusted certification authority (CA) center. However, the generation and management of certificates is extremely cumbersome. Hence, in recent work, Lin et al. proposed a new notion of identity-based homomorphic signature, which intends to avoid using certificates. But the key escrow problem is inevitable for identity-based primitives. In this article, we propose another new notion (for network coding): certificateless homomorphic signature (CLHS), which is a compromise for the above two techniques. In particular, we first describe the definition and security model of certificateless homomorphic signature. Then based on bilinear map and the computational Diffie-Hellman (CDH) assumption, give a concrete implementation and detailedly analyze its security. Finally, performance analysis illustrates that our construction is practical.

[1]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[2]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[3]  Nuttapong Attrapadung,et al.  Homomorphic Network Coding Signatures in the Standard Model , 2011, Public Key Cryptography.

[4]  Jinyong Chang,et al.  General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..

[5]  Ying Zhu,et al.  Multicast with network coding in application-layer overlay networks , 2004, IEEE Journal on Selected Areas in Communications.

[6]  Hui Ma,et al.  RKA Security of Identity-Based Homomorphic Signature Scheme , 2019, IEEE Access.

[7]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[8]  Fei Wang,et al.  RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.

[9]  Yi Mu,et al.  Certificateless Signature Revisited , 2007, ACISP.

[10]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[11]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[12]  SK Hafizul Islam,et al.  Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.

[13]  Jayaprakash Kar,et al.  ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve , 2013, Int. J. Netw. Secur..

[14]  Yang Ming,et al.  Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage , 2019, IEEE Access.

[15]  Shouhuai Xu,et al.  Secure and efficient proof of storage with deduplication , 2012, CODASPY '12.

[16]  Wenbin Chen,et al.  Lattice-based linearly homomorphic signatures in the standard model , 2016, Theor. Comput. Sci..

[17]  Jian Shen,et al.  A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.

[18]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[19]  Genqing Bian,et al.  Comment on “A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding” , 2020, IEEE Transactions on Parallel and Distributed Systems.

[20]  Sun,et al.  Secure Certificateless Encryption with Short Ciphertext , 2010 .

[21]  Dawu Gu,et al.  Provably secure authenticated key exchange protocol under the CDH assumption , 2010, J. Syst. Softw..

[22]  Dario Catalano,et al.  Homomorphic Signatures and Message Authentication Codes , 2014, SCN.

[23]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[24]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Yupu Hu,et al.  Lattice-based linearly homomorphic signature scheme over binary field , 2012, Science China Information Sciences.

[26]  Yutaka Kawai,et al.  Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[27]  Wen-Guey Tzeng,et al.  Unique Signature with Short Output from CDH Assumption , 2015, ProvSec.

[28]  Duncan S. Wong,et al.  Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.

[29]  Flavio D. Garcia,et al.  A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.

[30]  Dan Boneh,et al.  Homomorphic Signatures for Polynomial Functions , 2011, EUROCRYPT.

[31]  Jian Shen,et al.  An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.

[32]  Jinyong Chang,et al.  Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system , 2016, Secur. Commun. Networks.

[33]  Chau Yuen,et al.  A Tag Encoding Scheme against Pollution Attack to Linear Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.

[34]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[35]  Dan Boneh,et al.  Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.

[36]  Jan M. Rabaey,et al.  Overcoming untuned radios in wireless networks with network coding , 2006, IEEE Transactions on Information Theory.

[37]  Ashutosh Saxena,et al.  An Efficient Certificateless Signature Scheme , 2005, CIS.

[38]  Jonathan Katz,et al.  Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..