翻訳と辞書
Words near each other
・ Homology, Homotopy and Applications
・ Homology-derived Secondary Structure of Proteins
・ Homoloidea
・ Homolophus
・ Homolovi State Park
・ Homolycorine
・ Homolysis
・ Homolysis (biology)
・ Homolysis (chemistry)
・ Homomeric
・ Homometric structures
・ Homomonument
・ Homomorphic encryption
・ Homomorphic filtering
・ Homomorphic secret sharing
Homomorphic signatures for network coding
・ Homomorphism
・ Homona (genus)
・ Homona aestivana
・ Homona anopta
・ Homona antitona
・ Homona apiletica
・ Homona auriga
・ Homona bakeri
・ Homona baolocana
・ Homona bicornis
・ Homona biscutata
・ Homona blaiki
・ Homona brachysema
・ Homona coffearia


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Homomorphic signatures for network coding : ウィキペディア英語版
Homomorphic signatures for network coding
Network coding has been shown to optimally use bandwidth in a network, maximizing information flow but the scheme is very inherently vulnerable to pollution attacks by malicious nodes in the network. A node injecting garbage can quickly affect many receivers. The pollution of network packets spreads quickly since the output of (even an) honest node is corrupted if at least one of the incoming packets is corrupted. An attacker can easily corrupt a packet even if it is encrypted by either forging the signature or by producing a collision under the hash function. This will give an attacker access to the packets and the ability to corrupt them. Denis Charles, Kamal Jain and Kristin Lauter designed a new homomorphic encryption signature scheme for use with network coding to prevent pollution attacks.〔http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.60.4738&rep=rep1&type=pdf〕 The homomorphic property of the signatures allows nodes to sign any linear combination of the incoming packets without contacting the signing authority. In this scheme it is computationally infeasible for a node to sign a linear combination of the packets without disclosing what linear combination was used in the generation of the packet. Furthermore, we can prove that the signature scheme is secure under well known cryptographic assumptions of the hardness of the discrete logarithm problem and the computational Elliptic curve Diffie–Hellman.
==Network coding==
Let G = (V, E) be a directed graph where V is a set, whose elements are called vertices or nodes, and E is a set of ordered pairs of vertices, called arcs, directed edges, or arrows. A source s \in V wants to transmit a file D to a set T \subseteq V of the vertices. One chooses a vector space W/\mathbb_p(say of dimension d), where p is a prime, and views the data to be transmitted as a bunch of vectors w_1 ,\ldots , w_k \in W. The source then creates the augmented vectors v_1,\ldots , v_k by setting v_i = (0, \ldots , 0, 1, \ldots , 0, w_, \ldots , w) where w_ is the j-th coordinate of the vector w_i. There are (i-1) zeros before the first '1' appears in v_i. One can assume without loss of generality that the vectors v_i are linearly independent. We denote the linear subspace (of \mathbb_p^ ) spanned by these vectors by V . Each outgoing edge e \in E computes a linear combination, y(e), of the vectors entering the vertex v = in(e) where the edge originates, that is to say
: y(e) = \sum_(m_e(f)y(f))
where m_e(f) \in \mathbb_p. We consider the source as having k input edges carrying the k vectors w_i. By induction, one has that the vector y(e) on any edge is a linear combination y(e) = \sum_(g_i(e)v_i) and is a vector in V . The k-dimensional vector g(e) = (g_1(e), \ldots , g_k(e)) is simply the first ''k'' coordinates of the vector y(e). We call the matrix whose rows are the vectors g(e_1), \ldots , g(e_k), where e_i are the incoming edges for a vertex t \in T, the global encoding matrix for t and denote it as G_t. In practice the encoding vectors are chosen at random so the matrix G_t is invertible with high probability. Thus any receiver, on receiving y_1, \ldots , y_k can find w_1,\ldots ,w_k by solving
: \begin y'\\ y_2' \\ \vdots \\ y_k' \end = G_t \begin w_1\\ w_2 \\ \vdots \\ w_k \end
where the y_i' are the vectors formed by removing the first k coordinates of the vector y_i.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Homomorphic signatures for network coding」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.